Palo Alto Networks recently discovered a Remote Access Trojan dubbed SpyNote that is free available allowing anyone to launch attacks in the wild. I love when the sale happens in malls. People just rush and want to get good things for cheap prices. And who doesn’t love something free? The spyware and malware market is highly lucrative when […]
A new ransomware campaign relies on a Locky variant that is distributed through JavaScript that includes the binary of the threat itself. Locky is one of the most infamous threats of the ransomware family and according to the experts it is in continuous evolution. The threat has been using JavaScript attachments as a distribution mechanism, but most […]
The No More Initiative aims to spread information about ransomware and the risk of exposure,providing suggestions to avoid falling victim to the threat. A joint operation conducted by the Europol with police and cyber security firms worldwide aims to tackle the Ransomware threat. It has been estimated that the ransomware victims tripled in the first quarter of […]
The NSA whistleblower Edward Snowden and the popular hacker Andrew âBunnieâ Huang designed Introspection Engine, an interesting anti-surveillance device. While the number of mobile devices is outclassing the number of desktop ones, the concern about the surveillance activities conducted by governments is growing as never before also thanks the Snowden revelations. Mobile devices, often unprotected, […]
Recently, Reuters reported that the FBI sent an urgent confidential ‘Flash’ message to businesses and organizations to warn them about ransomware. Sponsored Content It is that dangerous. This is a new version of the ransom note, a form of malware that interferes with access to user files and data by encrypting it. Those running the […]
A large number of business websites have been compromised by the SoakSoak gang to deliver ransomware. Security experts from Invincea firm have discovered that a large number of websites were recruited by the SoakSoak botnet to deliver CryptXXX malware. The list of compromised sites is long and includes the tourism website for Guatemala and the do-it-yourself project […]
Delilah is the first extortion trojan that spies on victims and collects information to force them in doing malicious activities from inside. Delilah is a strain of malware developed to extort victims into stealing insider data, it was first discovered on crime forums by the Israeli intelligence firm Diskin Advanced Technologies. Deliah is not distributed in […]
Security experts from Damballa that analyzed the SFG malware confirmed that it was not designed to target SCADA systems in the energy industry Recently, experts from the SentinelOne security firm spotted a sophisticated malware dubbedSFG, a spawn of Furtim malicious code, targeting at least one European energy company. Media speculated the existence of a powerful SFG […]
Security researchers from Symantec have discovered a new variant of the Android.Fakebank.B banking trojan that prevents users from calling banks. Security experts from Symantec have spotted a new strain of mobile Trojan dubbed Android.Fakebank.B that prevents users from making outgoing calls to banks from their mobile devices. Android.Fakebank.B was first spotted in October 2013, it was able to […]
Taiwanese law enforcement agencies are investigating malware-based attacks against ATMs of a national bank that resulted in a $2 million theft. Law enforcement in Taiwan investigating the attacks against ATMs of a major nations bank, the Taiwan’s First Bank. Crooks used a malware to withdraw more than $2 million from dozens of ATMs in the country, it […]