Monday, June 1st, 2015
Go online for five minutes. Visit a few webpages. How many pictures do you see?
With the media rich nature of the web, chances are your answer is in the hundreds. It is in this space the future of malicious cyber attacks could be embedded. In a presentation at Hack In ...
Posted in Internet, Privacy, Security | No Comments
Thursday, May 21st, 2015
You've been hit by ransomware and you don't know what to do?
Jada Cyrus has assembled a helpful "Ransomware Removal Kit" which contains decryption tools for CryptoLocker, CoinVault, TeslaCrypt and FBIRansomWare, along with instructions on how to use them.
"You should never pay the ransom. This will only reinforce this type of ...
Posted in Internet, Privacy, Security, Windows | No Comments
Monday, May 4th, 2015
Researchers have uncovered new malware that takes extraordinary measures to evade detection and analysis, including deleting all hard drive data and rendering a computer inoperable.
Rombertik, as the malware has been dubbed by researchers from Cisco Systems' Talos Group, is a complex piece of software that indiscriminately collects everything a ...
Posted in Internet, Security | No Comments
Thursday, April 30th, 2015
Macro malware, that tried-and-true document-borne attack vector, is back. Over the past few months, Microsoft has seen an increasing macro downloader trend that affects nearly 501,240 unique machines worldwide.
The majority of the macro-malware attacks have taken place in the United States and United Kingdom.
Macro malware gets into your ...
Posted in Internet, Security, Windows | No Comments
Tuesday, April 21st, 2015
Since the discovery of the Poweliks fileless Trojan in August 2014, researchers have been expecting other similar malware to pop up.
The wait is over: Phasebot malware, which also has fileless infection as part of its routine, is being sold online.
"Unlike most malware, fileless malware hides itself in locations that are ...
Posted in Internet, Security | No Comments