A security researcher has compiled the Ransomware Removal kit that could be used in the process of responding to ransomware infections. CryptoLocker, CoinVault, and TeslaCrypt are the names of some of the most dreaded ransomware that infected million of users worldwide. The extortion is a very common practice in the cyber criminal underground and ransomware are […]
Intel Security published an a curious study to test consumer knowledge about phishing practice and measure the ability to detect phishing emails. For this study, Intel Security presented 10 emails where people were asked to identify which emails were phishing with the purpose of steal personal data, and which were legit, legal emails. The data for the […]
Several dozen Imperva Incapsula customers were targeted by a DDoS botnet comprised of tens of thousands of hijacked SOHO routers. Security experts at Incapsula firm spotted a DDoS botnet composed of tens of thousands of malware-infected Small Office / Home Office SOHO routers engaged in application layer HTTP flood attacks. The SOHO routers were infected with a strain […]
British Law enforcement has published a collection of pictures showing the use of pinhole cameras and iPods to steal card details at ATM machines. Law enforcement has shared a collection of images showing a last trend in the criminal underground, the use of pinhole cameras and iPods to steal card details at ATM machines. These […]
Quantum computing in credit cards introduces a new type of encryption (quantum cryptography) that will make magnetic strips and EVS solutions obsolete. Nowadays getting credit card credentials it’s not difficult and you don’t need to have technical skills, you can just buy them in the dark web, but that’s may change in the future thanks […]
Law enforcement identifies and located suspects members of a criminal organization that used gas pump skimmers, by using the GPS technology. The number of attacks against ATMs located in supermarkets and Gas pumps is constantly increasing, the crooks use credit and debit card skimmers that use different technologies to steal card data and steal them. Today […]
A Google study on Ad injection activities revealed that more than 5% of unique IPs visiting Google-owned websites had at least one ad injector installed. According to a new report published by Google 5.5% of unique daily IP addresses visiting google-owned websites have at least on ad injector installed, superfish.com is the most popular, being […]
According to data provided by British law enforcement, at least a 25 percent of organised criminals in the country is converting themselves to cybercrime. Cybercrime is becoming even more attractive to traditional crooks, including violent offenders. According to data provided by British law enforcement traditional crimes were continuing to fall while the number of online crimes […]
AlphaCrypt ransomware is a new type of ransomware has been detected by security expert in the wild. The malware is delivered via Angler Exploit kit. Ransomware is among most popular malware families in the criminal underground, recently security firms have discovered numerous variant targeting desktop and mobile platforms. Recently a new strain of ransomware dubbed […]
Criminals, activists, and whistleblowers have a new weapon dubbed USBKill in their arsenal to shut down laptops before they police start examining them. The best way to protect data from prying eyes is to destroy them, this is the thought of criminals when law enforcement is investigating on them. The best option for crooks it […]