Wednesday, December 17th, 2014
Most ransomware has a binary file that needs to be executed before it can infect your PC. Ransomware usually relies on social engineering or exploits to infect unsuspecting users. However, some malware authors are bypassing this requirement with a new trick - browser lockers.
Unlike traditional ransomware threats that lock the entire desktop, ...
Posted in Internet, Security, Windows | No Comments
Tuesday, February 4th, 2014
More than 180,000 Google Chrome users have installed at least one of a dozen ad-injecting extensions that are serving up spam on 44 different websites, according to findings by the threat and research analysis team with Barracuda Labs.
As of Jan. 30, the “logo quiz game” extension has been installed by nearly 82,000 ...
Posted in Internet, Security | No Comments
Wednesday, November 13th, 2013
Back in July 2013, we had discovered a new method of spreading the infamous FBI ransomware by using JavaScript code and iframes to create an illusion that the victim’s browser was locked.
After several months, the threat is still very much alive hopping from one domain name to the next. The message is still ...
Posted in Internet, Security | No Comments
Wednesday, November 13th, 2013
Cracked.com, a humor website that is among the 300 most popular sites in the U.S., may have left visitors a sobering surprise this week.
According to Barracuda Labs, as of Sunday the website was compromised to host the Nuclear Pack exploit kit.
Daniel Peck, principal research scientist on the security team at Barracuda Labs, ...
Posted in Internet, Privacy, Security | No Comments
Tuesday, August 6th, 2013
The TOR Project is advising that people stop using Windows after the discovery of a startling vulnerability in Firefox that undermined the main advantages of the privacy-centered network.
The zero-day vulnerability allowed as-yet-unknown interlopers to use a malicious piece of JavaScript to collect crucial identifying information on computers visiting some websites ...
Posted in Internet, Privacy, Security | No Comments
Page 3 of 16«12345...10...»Last »