
2016 Trends in Ransomware
Ransomware is not a new phenomenon, yet it remains one of the most popular forms of cybercrime due to the ease of its distribution and the good profits it provides to criminals. One of the reasons for the proliferation of…
Ransomware is not a new phenomenon, yet it remains one of the most popular forms of cybercrime due to the ease of its distribution and the good profits it provides to criminals. One of the reasons for the proliferation of…
All our devices could turn into a gateway for spying, even our headphones. Israeli security researchers at Ben Gurion University recently discovered a way to turn headphones into microphones to use them to record audio. In other words, your headphones…
Hacking group with long history in banking attacks has been reported to cause infections to ATM machines, allowing them to rig the machines to directly spit cash on the street. All the crooks had to do is stay in front…
SQL injection is enough to hack the Hungarian Human Rights Foundation. This is exactly what security pentester Kapustkiy did, together with CyberZeist. The two got access to more than 20,000 accounts and personal information such as phone numbers and home…
Christmas is coming! Unfortunately, in the realms of malware and cyber fraud, the coming of winter holidays bears a tinge of bitterness. It’s that time of the year when cybercriminal activity hits the ceiling. That being said, it should come…
Mobile application security company Kryptowire has just disclosed a pre-installed backdoor on more than 700 Android devices. The backdoor transmits data to a server in China every 72 hours. The firmware could target specific users and text messages matching remotely…
Troy Hunt has released information about yet another data leak affecting more than 8 million GitHub profiles. The security researcher, however, made sure to highlight that the leak isn’t a result of a vulnerability found on GitHub: (…)This incident is…
Is the UK government becoming the all-seeing eye? Image Source: Stirzocular/Deviantart Internet privacy definitely has a butterfly effect feeling to it. Or maybe the term ‘privacy’ is totally misused, as in most cases people are dealing with the lack of…
Nothing embodies the evolution of digital crime quite like crimeware-as-a-service. Years ago, bad actors preyed upon unsuspecting users by relying mainly on their technical acumen. Sure, they could share their techniques on IRC forums, but it was ultimately up to…
The exploit tool arsenal just got bigger. Meet PoisonTap, a tool created by the infamous Samy Kamkar. PoisonTap is designed to run freely available software on a $5 Raspeberry Pi Zero device. But how does it work? The tiny tool…
Australia’s facial verification system (FVS) which was announced in 2015 is already up and running. The first three agencies to have access are the Department of Foreign Affairs and Trade (DFAT), the Australian Federal Police (AFP), and the Department of…
The human operating system is culpable for a prevalent amount of network outages, a new global study finds. Conducted by Dimensional Research, the study (called “Network Complexity, Change, and Human Factors Are Failing the Business”) surveyed 315 network professionals regarding…
Did you know that Sofia, the capital of Bulgaria, was the birth place of one of the most destructive and infectious computer viruses of the late 90’s? The Dark Avenger first appeared in the spring of 1989, just in time…
Many malware researchers with extensive experience remember that Microsoft was a huge leader In cyber-security policy, because it made efforts to fix multiple vulnerabilities in it’s code and work with the security community constantly. However, the situation has now changed…
Another major data breach has been disclosed by Troy Hunt. In his words, the breach at global recruitment firm Michael Page has a lot in common with the Australian Red Cross incident. More particularly: It was the same individual who…
Ransomware is today’s most hated computer virus. However, the destructiveness of each ransomware depends on its roots. Is it part of an active, highly successful ransomware family periodically releasing new versions? Or is it one of those oddly “shaped” viruses…
The British institution Tesco Bank has seen a major breach on the bank accounts of approximately 20 000 of their customers. What is worse is that this was an online robbery attempt on the accounts and even though the bank…
The latest 14 security bulletins by Microsoft have patched 60 vulnerabilities in Windows OS, Office, Edge and Internet Explorer browsers, and SQL servers. One of the bulletins addresses flaws in Adobe Flash Player upgraded via Windows Update in Windows 10…
Researchers have reported that Android phones have been infected in a massive redistribution campaigns of banking malware for the mobile OS. Experts at Avast have reported that the malware is an evolved version of what is known as GM Bot…
Google’s Safe Browsing has been safeguarding users from various online threats, and has never failed to evolve accordingly to the needs of users. On November 8 Google announced that they’re going to punish websites that repeatedly endanger users through malware,…