CoinVault and Bitcryptor ransomware victims don’t need to pay the ransom
Kaspersky Lab has added an additional 14,031 decryption keys to their free repository, enabling all those who have fallen victim to CoinVault and Bitcryptor ransomware to …
Domain name holders hit with personalized, malware-laden suspension notices
A clever new email spam campaign has been spotted targeting domain name holders, trying to trick them into downloading malware on their systems.The emails take the form of a …
The top threat vector for mobile devices? Porn
As mobile devices become more deeply woven into the fabric of our personal and work lives, cyber criminals are taking increasingly vicious and disturbingly personal shots at …
Attackers are turning MySQL servers into DDoS bots
Someone has been compromising MySQL servers around the world and using them to mount DDoS attacks. The latest targets of these attacks are an (unnamed) US hosting provider and …
What can we expect from 2016? A growth in online extortion, hacktivism and mobile malware
Next year, continued growth in online extortion, hacktivism and mobile malware is expected, as well as a shift to an offensive cybersecurity posture for government entities …
Regin spyware found on German Chancellery staff’s personal laptop
The German Federal Prosecutor’s Office has started an investigation regarding the discovery of the infamous Regin backdoor on the private laptop owned by a staff member …
12 new malware strains discovered each minute
G DATA researchers discovered a 64.8 percent spike of new malware strains as compared to the first half of 2014. This averages out to 12 new strains per minute. In all, the …
New ransomware delivered via Windows Remote Desktop Services
A new type of ransomware – dubbed LowLevel04 – is hitting users in Greece and Bulgaria. It is apparently delivered on the affected computers manually by the …
Fitbit trackers can easily be infected with malware, and spread it on
Security researcher Axelle Apvrille has managed to deliver malware to a FitBit Flex fitness tracker, and to spread the infection to any computer that the device is …
Malicious Google Chrome clone eFast serves ads, collects info
A Google Chrome lookalike browser dubbed eFast is being actively pushed onto users. The software is at best annoying and unwanted, and at worst can lead users to …
Exposing the most dangerous financial malware threats
Cyphort analyzed the top eight types of financial malware cybercriminals are using today to target banks and electronic payment systems.The most dangerous financial malware …
Exposing the most dangerous financial malware threats
“Cyphort analyzed the top eight types of financial malware cybercriminals are using today to target banks and electronic payment systems. The most dangerous financial …