Cyber Crime

A new massive spam campaign is spreading Locky ransomware downloaders

Experts at Trustwave observed a new massive spam campaign that was sending a JavaScript attachment that downloads Locky ransomware. Ransomware…

10 years ago

Typos stopped hackers stealing $1bn from Federal Reserve Bangladesh account

Hackers who allegedly infiltrated the Federal Reserve Bangladesh's account were attempting to steal almost $1 billion, but typos thwarted the…

10 years ago

Snowden FBI is lying, it can already unlock iPhone without Apple support

Snowden accuses the FBI of lying about his ability to unlock the iphone of the San Bernardino terrorist. "that’s horse…

10 years ago

Bangladesh says hackers stole $100 Million from its US Federal Reserve account

Unknown hackers have stolen more than $100 million from the Bangladesh Bank account at the US Federal Reserve Bank. According…

10 years ago

All current and past Seagate employees victims of W-2 phishing

w-2-phishing - Scammers tricked an employee at data storage firm Seagate Technology into giving away W-2 tax documents on all…

10 years ago

KeRanger, the new MAC OS X ransomware that hit Apple users on the weekend

Over the weekend Apple customers who were looking for the latest version of Transmission were infected by KeRanger MAC OS…

10 years ago

Which are principal cybercriminal ecosystems in the Deep Web?

TrendMicro published an interesting analysis of the principal cyber criminal underground communities in the Deep Web worldwide. A new interesting…

10 years ago

The popular Romanian Hacker Guccifer will be extradited to US soon

The Romania’s High Court of Cassation and Justice ruled that the popular Romanian hacker Guccifer will be extradited to the…

10 years ago

SIM swap fraud cases force bank to improve security

Two major high street banks will change security procedures after journalists  demonstrated how to carry out SIM swap fraud attacks.…

10 years ago

Real pirates used hacking techniques to raid a shipping company

Real pirates have hacked into a shipping company to locate valuable cargo before hijacking vessels in targeted attacks. Technology meets…

10 years ago

This website uses cookies.