Cyber Crime

Popular Kim Dotcom’s domains, seized by the FBI, now in the hands of crooksPopular Kim Dotcom’s domains, seized by the FBI, now in the hands of crooks

Popular Kim Dotcom’s domains, seized by the FBI, now in the hands of crooks

Two of the most popular domains of ever, that were seized by the FBI from Kim Dotcom three years ago,…

10 years ago
Security Affairs newsletter Round 11 – Best of the week from best sourcesSecurity Affairs newsletter Round 11 – Best of the week from best sources

Security Affairs newsletter Round 11 – Best of the week from best sources

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free…

10 years ago
Locker Ransomware Author Allegedly Releases Database Dump of Private KeysLocker Ransomware Author Allegedly Releases Database Dump of Private Keys

Locker Ransomware Author Allegedly Releases Database Dump of Private Keys

Allegedly, the author of the "Locker" ransomware has uploaded a dump of the C2 server database, releasing private keys of…

10 years ago
The recently Patched Flash flaw exploited by Angler EK to serve malwareThe recently Patched Flash flaw exploited by Angler EK to serve malware

The recently Patched Flash flaw exploited by Angler EK to serve malware

The authors of the popular Angler exploit kit integrated an exploit for a Flash Player flaw fixed by Adobe just…

10 years ago
IRS breached, hackers access data of more 100,000 taxpayersIRS breached, hackers access data of more 100,000 taxpayers

IRS breached, hackers access data of more 100,000 taxpayers

The Internal Revenue Service (IRS) was breached by hackers that "used an online service provided by the agency" to access…

10 years ago
A student hired hackers to attack schools of the West Ada school districtA student hired hackers to attack schools of the West Ada school district

A student hired hackers to attack schools of the West Ada school district

An Eagle High School student may be charged with a felony after being accused of a cyber attack on the…

10 years ago
NitlovePoS, The New PoS Malware is being spread by SpamNitlovePoS, The New PoS Malware is being spread by Spam

NitlovePoS, The New PoS Malware is being spread by Spam

Researchers at FireEye have detected a new strain of point-of-sale (POS) malware being used in the wild and served through…

10 years ago
Tox, how to create your ransomware in 3 stepsTox, how to create your ransomware in 3 steps

Tox, how to create your ransomware in 3 steps

McAfee discovered in the Deep Web a ransomware-construction kits that allow easy to build malware in just 3 steps, implementing…

10 years ago
Why Carbanak C&C points to Russia Federal Security Service?Why Carbanak C&C points to Russia Federal Security Service?

Why Carbanak C&C points to Russia Federal Security Service?

A security researcher at Trend Micro discovered that the malware used by the Carbanak cybergang is using a C&C server…

10 years ago
Fake Android Minecraft apps scammed million usersFake Android Minecraft apps scammed million users

Fake Android Minecraft apps scammed million users

Experts at ESET have discovered over 30 scareware uploaded to the Google Play store over nine months masquerading as Minecraft…

10 years ago