Zeljka Zorz
Android RAT impersonates Kaspersky Mobile Security
A clever malware delivery campaign impersonating well-known AV vendor Kaspersky Lab is actively targeting Polish Android users. It all starts with a spam email sporting the …
How to foil SynoLocker and minimize the damage
We wrote on Monday warning about Synology NAS users being targeted with SynoLocker, a customized version of the Cryptolocker ransomware, which encrypts the files contained on …
Poweliks malware creates no files, lays low in the registry
For most malware, performing their malicious task(s) is the primary goal, and a close second is to stay unnoticed on the system for as long as possible. As developers of …
China bans Symantec, Kaspersky software from govt systems
Symantec and Kaspersky Lab have become the latest victims of Chinese government’s procurement agency’s axe as the two firms have been dropped from the approved …
Synology NAS users hit with Cryptolocker variant
You know that your products are getting to be very popular when cybercriminals target users with a customized version of the Cryptolocker ransomware. The products in question …
Thousands of Mozilla developers’ emails, passwords exposed
Email addresses and encrypted passwords of tens of thousands of Mozilla developers were accidentally exposed and might have been harvested by malicious individuals, Stormy …
Retailers warned of attacks using hard-to-spot PoS malware
Retailers, beware: cyber crooks are increasingly targeting remote desktop applications by brute-forcing passwords, and are using that access to plant hard-to-detect PoS …
CIA chief admits agency employees hacked Senate computers
CIA Director John Brennan has confirmed that five CIA employees have, indeed, “improperly accessed” computers of Senate staffers and the computer network that was …
Targeted Cyber Attacks
Targeted cyber attacks against individuals, organizations, businesses, groups, and critical services happen every day around the globe. This book aims to tell you how …
Microsoft releases EMET 5.0
Microsoft has released version 5.0 of its Enhanced Mitigation Experience Toolkit (EMET), a free utility that uses a number of security mitigation techniques to prevent the …
Malicious USB device firmware the next big infection vector?
Researchers from German security consultancy SR Labs have created a whole new class of attacks that can compromise computer systems via ubiquitous and widely used …
Security contest rewards builders of secure systems
More often than not, computer security competitions come in the form of Capture The Flag (CTF) contests, and the emphasis is on breaking systems. This approach helps defenders …
Featured news
Sponsored
Don't miss
- The effect of compliance requirements on vulnerability management strategies
- Modernizing incident response in the AI era
- Why cybersecurity leaders trust the MITRE ATT&CK Evaluations
- How the role of observability is changing within organizations
- Cybercriminals used a gaming engine to create undetectable malware loader