search

Date range
Filters

1036 results

Pierluigi Paganini June 06, 2015
Malicious Facebook UnfriendAlert app used to steal FB credentials

Fraudsters are spreading a Facebook UnfriendAlert app that notifies users whenever someone removes them from friend list, in reality it collects credentials Curiosity Killed the Cat, everybody wants to know who is visiting his profile on every social media platform. The new scam scheme is targeting Facebook users that want to control who visit their […]

Pierluigi Paganini June 04, 2015
The FBI is not able to monitor ISIS’s encrypted communications

The FBI warned lawmakers there was no way to monitor encrypted online communications among sympathizers of the ISIS, it urges a law to give them more powers. The FBI warned lawmakers there was no way to monitor encrypted online communications exploited by Islamic State militants and sympathizers. The law enforcement urges IT giants to provide […]

Pierluigi Paganini May 30, 2015
Locker Ransomware Author Allegedly Releases Database Dump of Private Keys

Allegedly, the author of the “Locker” ransomware has uploaded a dump of the C2 server database, releasing private keys of infected hosts to the public. Allegedly, the author of the “Locker” ransomware has uploaded a dump of the C2 server database, releasing private keys of infected hosts worldwide to the public.  The “author” claims that […]

Pierluigi Paganini May 30, 2015
Locker Ransomware Utilizes a Unique Delivery Mechanism

The cyber security expert Michael Fratello has made a detailed analysis of the locker ransomware that implements a unique delivery mechanism On May 25th, 2015, a wave of reports came flooding in from users around the globe, claiming that their computers have become compromised.  Messages from users looking for help began appearing on forums such […]

Pierluigi Paganini May 26, 2015
Tox, how to create your ransomware in 3 steps

McAfee discovered in the Deep Web a ransomware-construction kits that allow easy to build malware in just 3 steps, implementing an interesting model of sale. In the criminal underground it is easy to find malware-construction kits that allow easy to build malicious code from existing templates and in same cases starting from legitimate applications. A […]

Pierluigi Paganini May 17, 2015
Security Affairs newsletter Round 9 – Best of the week from best sources

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. Hiring hackers, how much is it? US SOCOM and The Special Forces to Scrutinize Social media Skynet, the US top-secret program to track terrorists PHP hash comparison flaw is […]

Pierluigi Paganini May 16, 2015
Tails 1.4 is out to preserve your privacy and anonymity

The Debian-based distribution Tails 1.4 (The Amnesiac Incognito Live System) is available online and it is improved to preserve user privacy and anonymity. The Debian-based distribution Tails, “The Amnesiac Incognito Live System,”version 1.4 is available online! Tails is a popular live operating system (that means that users can start it on almost any computer from removable […]

Pierluigi Paganini May 10, 2015
US SOCOM and The Special Forces to Scrutinize Social media

US SOCOM admitted that Counter-Terrorism Special Forces scrutinize FaceBook and other social media to handle potentially useful information. Exactly two years ago I wrote about the use of social media in the Military. I explained why social media platforms represent a powerful instrument for activities operated by governments and intelligence agencies. Modern social media networks are actively used by […]

Pierluigi Paganini May 08, 2015
GPU-based malware, the evolution of rootkits and keyloggers

Malware developers have presented two proof-of-concept malware, a rootkit and a keylogger, which exploit the GPU of the infected host. Malware authors always demonstrate a great creativity and the ability to propose even more effective solutions, recently developers have published two strains of malware, Jellyfish rootkit and the Demon keylogger, that implement an unusual way to run on a victim’s […]

Pierluigi Paganini May 07, 2015
New AlphaCrypt ransomware, the new threat in the criminal underground

AlphaCrypt ransomware is a new type of ransomware has been detected by security expert in the wild. The malware is delivered via Angler Exploit kit. Ransomware is among most popular malware families in the criminal underground, recently security firms have discovered numerous variant targeting desktop and mobile platforms. Recently a new strain of ransomware dubbed […]