Malware

The Great Spyware sale: SpyNote available for free useThe Great Spyware sale: SpyNote available for free use

The Great Spyware sale: SpyNote available for free use

Palo Alto Networks recently discovered a Remote Access Trojan dubbed SpyNote that is free available allowing anyone to launch attacks…

9 years ago
Locky Ransomware now relies on JavaScript instead downloaders Locky Ransomware now relies on JavaScript instead downloaders 

Locky Ransomware now relies on JavaScript instead downloaders

A new ransomware campaign relies on a Locky variant that is distributed through JavaScript that includes the binary of the…

9 years ago
Europol and IT security firms united against the ransomwareEuropol and IT security firms united against the ransomware

Europol and IT security firms united against the ransomware

The No More Initiative aims to spread information about ransomware and the risk of exposure,providing suggestions to avoid falling victim…

9 years ago
Snowden and Bunnies devised the Introspection Engine to avoid surveillanceSnowden and Bunnies devised the Introspection Engine to avoid surveillance

Snowden and Bunnies devised the Introspection Engine to avoid surveillance

The NSA whistleblower Edward Snowden and the popular hacker Andrew “Bunnie” Huang designed Introspection Engine, an interesting anti-surveillance device. While…

9 years ago
The threat of RansomwareThe threat of Ransomware

The threat of Ransomware

Recently, Reuters reported that the FBI sent an urgent confidential 'Flash' message to businesses and organizations to warn them about…

9 years ago
Major websites compromised in the last SoakSoak campaignMajor websites compromised in the last SoakSoak campaign

Major websites compromised in the last SoakSoak campaign

A large number of business websites have been compromised by the SoakSoak gang to deliver ransomware. Security experts from Invincea…

9 years ago
Delilah, the first Trojan to recruit InsidersDelilah, the first Trojan to recruit Insiders

Delilah, the first Trojan to recruit Insiders

Delilah is the first extortion trojan that spies on victims and collects information to force them in doing malicious activities…

9 years ago
SFG malware was not designed to target SCADA systems in the energy industrySFG malware was not designed to target SCADA systems in the energy industry

SFG malware was not designed to target SCADA systems in the energy industry

Security experts from Damballa that analyzed the SFG malware confirmed that it was not designed to target SCADA systems in…

9 years ago
Android.Fakebank.B inhibits outgoing calls to bank customer servicesAndroid.Fakebank.B inhibits outgoing calls to bank customer services

Android.Fakebank.B inhibits outgoing calls to bank customer services

Security researchers from Symantec have discovered a new variant of the Android.Fakebank.B banking trojan that prevents users from calling banks.…

9 years ago
Hackers used malware to steal $2 million from ATMs in TaiwanHackers used malware to steal $2 million from ATMs in Taiwan

Hackers used malware to steal $2 million from ATMs in Taiwan

Taiwanese law enforcement agencies are investigating malware-based attacks against ATMs of a national bank that resulted in a $2 million…

9 years ago