Cybercrime

How much costs a DDoS attack service? Which factors influence the final price?

How much costs a DDoS attack service? Kaspersky Lab published an analysis on the cost of a DDoS attack and…

9 years ago

US blames North Korea for the $81 million Bangladesh cyber heist

US federal prosecutors speculate the involvement of North Korea in the cyber heist of $81 million from Bangladesh's account at the New…

9 years ago

Data breach – Are you an Android Forums user? Resets your passwords now.

Android Forums notified a data breach, according to the moderators at the site roughly 2.5 percent of users have been…

9 years ago

Turkish Crime Family group will remotely wipe hundreds of millions of iPhones unless Apple pays ransom

Hackers belonging to the Turkish Crime Family group threaten to remotely wipe hundreds of millions of iPhones unless Apple pays…

9 years ago

Rogue Cellphone towers used to spread the Android Swearing Trojan

Chinese scammers are deploying rogue cellphone towers to spread the Android Swearing Trojan via malicious URL in SMS messages. Chinese…

9 years ago

Kirk ransomware – A Star Trek Themed Ransomware that requests Monero payments

The researchers have discovered a new piece of ransomware featuring a Star Trek theme, dubbed Kirk ransomware, the first one…

9 years ago

Symantec blames North Korean Lazarus APT group for recent attacks on banks

Further investigation on the attacks against Polish banks allowed Symantec to determine that North Korean Lazarus APT group was behind…

9 years ago

Global DDoS Threat Landscape Q4 2016 – US, UK and Netherlands top attacked countries

Imperva published the Global DDoS Threat Landscape Q4 2016, according to the experts the US, the UK and Netherlands are top…

9 years ago

Mac users enjoy, FindZip macOS Ransomware decryption tool is available online for free

Great news for macOS users who were infected by the FindZip macOS ransomware, Avast released a decryption tool for free.…

9 years ago

PetrWrap, a Petya-based ransomware, was used in targeted attacks

Threat actors in the wild have found the way to hijack the Petya ransomware on the fly and use it in…

9 years ago

This website uses cookies.