Wednesday, October 28th, 2015
Over the last few years ransomware has become a prominent way for hackers to extort money from victims. Ransomware such as Cryptolocker encrypts a victims computer and demands a payment to decrypt the files. What's surprising is how the FBI deals with victims of ransomware attacks. Last week at the ...
Posted in Internet, Privacy, Security | No Comments
Tuesday, October 20th, 2015
Security researchers have uncovered a new piece of Adware that replaces your entire browser with a dangerous copy of Google Chrome, in a way that you will not notice any difference while browsing. The new adware software, dubbed "eFast Browser," works by installing and running itself in place of Google Chrome The ...
Posted in Internet, Privacy, Security | No Comments
Saturday, October 3rd, 2015
Security researchers at Symantec have been tracking a malware tool that, for a change, most victims wouldn’t actually mind have infecting their systems--or almost, anyway.
The threat dubbed Linux.Wifatch compromises home routers and other Internet-connected consumer devices. But unlike other malware, this one does not steal data, snoop silently on victims, ...
Posted in Hardware, Internet, Linux, Networking, Security | No Comments
Wednesday, September 16th, 2015
PandaLabs has confirmed a record increase in the creation of new malware samples. In the second quarter of 2015 alone there were an average of 230,000 new malware samples detected each day, which means a total of 21 million new types in these three months.
Compared to the same period last ...
Posted in Internet, Privacy, Security | No Comments
Monday, September 14th, 2015
One of the ways that malware activity on a network is spotted is via the activity of their network activity. However, in many cases this can be difficult to detect: there have been incidents where command-and-control (C&C) servers were able to stay online and pose a problem for many years. ...
Posted in Internet, Security | No Comments