Tuesday, April 7th, 2015
Trend Micro researchers have found and analyzed a new piece of crypto-ransomware: CryptVault encrypts files, makes them look like files quarantined by an AV solution, asks for ransom and, finally, downloads info-stealer malware.
It arrives on target computers after the user has been tricked into downloading and running a malicious attachment ...
Posted in Internet, Privacy, Security | No Comments
Thursday, March 26th, 2015
DLL hijacking is an attack that makes applications load malicious dynamic link libraries instead of the intended -- clean and legit -- library on a Windows system.
Programs that don't specify paths to libraries are vulnerable to DLL hijacking as Windows uses a priority based search order in this case to ...
Posted in Internet, Security, Windows | No Comments
Tuesday, March 24th, 2015
There is no such thing as perfect security. Given enough knowledge, resources, and time any system can be compromised. The best you can do is to make it as difficult for an attacker as possible. That said there are steps you can take to harden your network against the vast ...
Posted in Hardware, Internet, Privacy, Security | No Comments
Friday, March 20th, 2015
Millions of flawed BIOSes can be infected using simple two-minute attacks that don't require technical skills and require only access to a PC to execute.
Basic Input/Output Systems (BIOS) have been the target of much hacking research in recent years since low-level p0wnage can grant attackers the highest privileges, persistence and ...
Posted in Hardware, Security | No Comments
Friday, March 20th, 2015
Security researchers nabbed $552,500 in bounties at this year's Pwn2Own hacking contest, demonstrating exploits against the top four Web browsers, plus Adobe Reader and Flash Player.
On Thursday, the second and final day of the competition, the star of the show was South Korean security researcher JungHoon Lee, aka "lokihardt," who ...
Posted in Internet, Privacy, Security | No Comments