Ransomware-wielding crooks made over $217,000 in a single month
Crypto-ransomware continues to be a very effective way for cyber crooks to “earn” serious money: the method is so lucrative that with a single campaign, the crooks …
Hackers use Pastebin to deliver backdoor code
Cyber attackers taking advantage of legitimate online services is not a new thing, and “online clipboard” Pastebin.com is often used to anonymously leak stolen …
HuffPo visitors targeted with malvertising, infected with ransomware
The last days of the past and the first days of the current year have been unlucky for visitors of several popular sites including the Huffington Post and Gamezone.com, which …
Detecting and Combating Malicious Email
Authors: Julie JCH Ryan and Cade Kamachi Pages: 94 Publisher: Syngress ISBN: 0128001100 Introduction After years and years of security professionals explaining the dangers of …
Number of cyber attacks on retailers drops by half
Despite an 50 percent decline in the number of attacks against U.S. retailers, the number of records stolen from them remains at near record highs. IBM Security researchers …
Top Facebook scams and malware attacks
Millions of people fell for Facebook scams in 2014. Though security experts, companies and tech-savvy users guard against Facebook cyber attacks, many unwary users continue to …
Russian hackers stole millions from banks, ATMs
Tens of millions of dollars, credit cards and intellectual property stolen by a new group of cyber criminals. Group-IB and Fox IT, in a joint research effort, released a …
New Zeus variant targets users of 150 banks
A new variant of the infamous Zeus banking and information-stealing Trojan has been created to target the users of over 150 different banks and 20 payment systems in 15 …
Malware peddlers take advantage of Sony’s decision to pull controversial film
In the wake of Sony Pictures Entertainment’s decision to scrap the theatrical release of the controversial film “The Interview” altogether, cyber criminals …
Malware peddlers turn again to malicious links
In the continuous see-sawing that spammers and malware peddlers perform between sending out emails with malicious links and those with malicious attachments, the former method …
Top 5 malware attacks: 35 reused components
CyActive identified the top five malware that returned the highest ROI for hackers with the least effort per dollar — achieved by recycling code and using the same methods …
TorrentLocker exposed: Investigation and analysis
ESET researchers analyzed a widespread case of ransomware generally known as TorrentLocker, which started spreading in early 2014. The latest variant of the malware has …
Featured news
Resources
Don't miss
- Job-seeking devs targeted with fake CrowdStrike offer via email
- January 2025 Patch Tuesday forecast: Changes coming in cybersecurity guidance
- The SBI fake banking app shows that SMS authentication has had its day
- Preventing the next ransomware attack with help from AI
- Banshee Stealer variant targets Russian-speaking macOS users