1044 results
Allegedly, the author of the “Locker” ransomware has uploaded a dump of the C2 server database, releasing private keys of infected hosts to the public. Allegedly, the author of the “Locker” ransomware has uploaded a dump of the C2 server database, releasing private keys of infected hosts worldwide to the public. The “author” claims that […]
The cyber security expert Michael Fratello has made a detailed analysis of the locker ransomware that implements a unique delivery mechanism On May 25th, 2015, a wave of reports came flooding in from users around the globe, claiming that their computers have become compromised. Messages from users looking for help began appearing on forums such […]
McAfee discovered in the Deep Web a ransomware-construction kits that allow easy to build malware in just 3 steps, implementing an interesting model of sale. In the criminal underground it is easy to find malware-construction kits that allow easy to build malicious code from existing templates and in same cases starting from legitimate applications. A […]
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. Hiring hackers, how much is it? US SOCOM and The Special Forces to Scrutinize Social media Skynet, the US top-secret program to track terrorists PHP hash comparison flaw is […]
The Debian-based distribution Tails 1.4 (The Amnesiac Incognito Live System) is available online and it is improved to preserve user privacy and anonymity. The Debian-based distribution Tails, “The Amnesiac Incognito Live System,”version 1.4 is available online! Tails is a popular live operating system (that means that users can start it on almost any computer from removable […]
US SOCOM admitted that Counter-Terrorism Special Forces scrutinize FaceBook and other social media to handle potentially useful information. Exactly two years ago I wrote about the use of social media in the Military. I explained why social media platforms represent a powerful instrument for activities operated by governments and intelligence agencies. Modern social media networks are actively used by […]
Malware developers have presented two proof-of-concept malware, a rootkit and a keylogger, which exploit the GPU of the infected host. Malware authors always demonstrate a great creativity and the ability to propose even more effective solutions, recently developers have published two strains of malware, Jellyfish rootkit and the Demon keylogger, that implement an unusual way to run on a victim’s […]
AlphaCrypt ransomware is a new type of ransomware has been detected by security expert in the wild. The malware is delivered via Angler Exploit kit. Ransomware is among most popular malware families in the criminal underground, recently security firms have discovered numerous variant targeting desktop and mobile platforms. Recently a new strain of ransomware dubbed […]
Italian police with the support of the Europol and the FBI arrested 10 members of a criminal gang that targeted many individuals and firms across the Europe. Italian law enforcement Guardia di Finanza with the support of the Europol and the FBI arrested ten members of a criminal organization operating in Italy and involved in Internet scams. […]
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from the best sources free for you in your email box. Google To Speed Up The Internet With Its New QUIC Protocol APT28 Russian hackers exploited two zero-day flaws in the wild Security Affairs newsletter Round 5 – Best of […]