search

Date range
Filters

1044 results

Pierluigi Paganini May 30, 2015
Locker Ransomware Author Allegedly Releases Database Dump of Private Keys

Allegedly, the author of the “Locker” ransomware has uploaded a dump of the C2 server database, releasing private keys of infected hosts to the public. Allegedly, the author of the “Locker” ransomware has uploaded a dump of the C2 server database, releasing private keys of infected hosts worldwide to the public.  The “author” claims that […]

Pierluigi Paganini May 30, 2015
Locker Ransomware Utilizes a Unique Delivery Mechanism

The cyber security expert Michael Fratello has made a detailed analysis of the locker ransomware that implements a unique delivery mechanism On May 25th, 2015, a wave of reports came flooding in from users around the globe, claiming that their computers have become compromised.  Messages from users looking for help began appearing on forums such […]

Pierluigi Paganini May 26, 2015
Tox, how to create your ransomware in 3 steps

McAfee discovered in the Deep Web a ransomware-construction kits that allow easy to build malware in just 3 steps, implementing an interesting model of sale. In the criminal underground it is easy to find malware-construction kits that allow easy to build malicious code from existing templates and in same cases starting from legitimate applications. A […]

Pierluigi Paganini May 17, 2015
Security Affairs newsletter Round 9 – Best of the week from best sources

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. Hiring hackers, how much is it? US SOCOM and The Special Forces to Scrutinize Social media Skynet, the US top-secret program to track terrorists PHP hash comparison flaw is […]

Pierluigi Paganini May 16, 2015
Tails 1.4 is out to preserve your privacy and anonymity

The Debian-based distribution Tails 1.4 (The Amnesiac Incognito Live System) is available online and it is improved to preserve user privacy and anonymity. The Debian-based distribution Tails, “The Amnesiac Incognito Live System,”version 1.4 is available online! Tails is a popular live operating system (that means that users can start it on almost any computer from removable […]

Pierluigi Paganini May 10, 2015
US SOCOM and The Special Forces to Scrutinize Social media

US SOCOM admitted that Counter-Terrorism Special Forces scrutinize FaceBook and other social media to handle potentially useful information. Exactly two years ago I wrote about the use of social media in the Military. I explained why social media platforms represent a powerful instrument for activities operated by governments and intelligence agencies. Modern social media networks are actively used by […]

Pierluigi Paganini May 08, 2015
GPU-based malware, the evolution of rootkits and keyloggers

Malware developers have presented two proof-of-concept malware, a rootkit and a keylogger, which exploit the GPU of the infected host. Malware authors always demonstrate a great creativity and the ability to propose even more effective solutions, recently developers have published two strains of malware, Jellyfish rootkit and the Demon keylogger, that implement an unusual way to run on a victim’s […]

Pierluigi Paganini May 07, 2015
New AlphaCrypt ransomware, the new threat in the criminal underground

AlphaCrypt ransomware is a new type of ransomware has been detected by security expert in the wild. The malware is delivered via Angler Exploit kit. Ransomware is among most popular malware families in the criminal underground, recently security firms have discovered numerous variant targeting desktop and mobile platforms. Recently a new strain of ransomware dubbed […]

Pierluigi Paganini April 28, 2015
Europol, Italian Police & FBI dismantled a cyber criminal gang

Italian police with the support of the Europol and the FBI arrested 10 members of a criminal gang that targeted many individuals and firms across the Europe. Italian law enforcement Guardia di Finanza with the support of the Europol and the FBI arrested ten members of a criminal organization operating in Italy and involved in Internet scams. […]

Pierluigi Paganini April 26, 2015
Security Affairs newsletter Round 6 – Best of the week from best sources

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. Google To Speed Up The Internet With Its New QUIC Protocol APT28 Russian hackers exploited two zero-day flaws in the wild Security Affairs newsletter Round 5 – Best of […]