Earlier this week, the NHS suffered a widespread and crippling cyberattack that put important data at risk. We take a look at ‘WanaCrypt0r 2.0’, the ransomware software behind the attack. What is ransomware? The first thing ...
Tags: ransomware, WannaCry
The creators of a Web-based attack tool called Angler Exploit Kit have added an exploit for a known vulnerability in Microsoft's Silverlight browser plug-in to the tool's arsenal. Exploit kits are essentially malicious Web applications ...
Tags: Computer Products, software
The cyber-extortionists behind the Cryptolocker "ransomware", which encrypts users' files and refuses to decrypt them without payment, have extended their deadline for affect PC users. Cryptolocker uses 256-bit Advanced Encryption ...
Tags: Computer Products, web surcrity
It was only a matter of time before it happened and now it has – ransom malware has successfully made the jump from the PC world, where it torments millions of Windows users, to the mobile world, where it has similar designs on ...
Tags: Android Smartphone, APP
The first three months of 2013 have seen a surge in spam volume, as well as large numbers of samples of the Koobface social networking worm and master boot record (MBR) infecting malware, according to antivirus vendor McAfee. After ...
Tags: McAfee, Spam, MBR Attack
Buried in a 100-page report issued last week by the Commission on the Theft of American Intellectual Property was a recommendation to copy a tactic cyber scammers use to extort money from innocent victims. The IP Commission -- a private ...
Tags: Computer Products, software
Buried in a 100-page report issued last week by the Commission on the Theft of American Intellectual Property was a recommendation to copy a tactic cyber scammers use to extort money from innocent victims. The IP Commission – a ...
Tags: Computer Products
A new variant of the Citadel financial malware is targeting users of the Payza online payment platform by launching local in-browser attacks to steal their credentials, according to researchers from security firm Trusteer. Citadel is a ...
Tags: Payza, Payment Platform, Computer Products
AutoIt, a scripting language for automating Windows interface interactions, is increasingly being used by malware developers thanks to its flexibility and low learning curve, according to security researchers from Trend Micro and ...
A recently patched Java remote code execution vulnerability is already being exploited by cybercriminals in mass attacks to infect computers with scareware, security researchers warn. The vulnerability, identified as CVE-2013-2423, was ...
Tags: Computer Products, software
The authors of police-themed ransomware have started using the browsing histories from infected computers in order to make their scams more believable, according to an independent malware researcher. Ransomware is a class of malicious ...
Tags: Computer Products, software
The authors of police-themed ransomware have started using the browsing histories from infected computers in order to make their scams more believable, according to an independent malware researcher. Ransomware is a class of malicious ...
Tags: Computer Products, software
BIG business is being targeted by cyber-criminals in "ransomware" attacks, threatening deletion or freezing of crucial business files unless money is paid. A new national survey of Australian big business reports that in September last ...
Tags: TriQuint, IT security, firewalls
A Russian man accused of being a key figure behind the notorious and hugely successful Reveton “police ransom” malware, which has successfully blackmailed thousands of PC users across the world, has been arrested in Dubai, ...
Cyber criminals have moved beyond the traditional PC, targeting Android, social media and even the Mac OS X with new attacks, according to Trend Micro’s 2012 Annual Roundup and Mobile Security reports. Malware targeting Android alone ...
Tags: cyber criminals, traditional PC, Android, social media