Please turn on your JavaScript for this page to function normally.
Ransomware-wielding crooks made over $217,000 in a single month

Crypto-ransomware continues to be a very effective way for cyber crooks to “earn” serious money: the method is so lucrative that with a single campaign, the crooks …

Hackers use Pastebin to deliver backdoor code

Cyber attackers taking advantage of legitimate online services is not a new thing, and “online clipboard” Pastebin.com is often used to anonymously leak stolen …

HuffPo visitors targeted with malvertising, infected with ransomware

The last days of the past and the first days of the current year have been unlucky for visitors of several popular sites including the Huffington Post and Gamezone.com, which …

email
Detecting and Combating Malicious Email

Authors: Julie JCH Ryan and Cade Kamachi Pages: 94 Publisher: Syngress ISBN: 0128001100 Introduction After years and years of security professionals explaining the dangers of …

Number of cyber attacks on retailers drops by half

Despite an 50 percent decline in the number of attacks against U.S. retailers, the number of records stolen from them remains at near record highs. IBM Security researchers …

Top Facebook scams and malware attacks

Millions of people fell for Facebook scams in 2014. Though security experts, companies and tech-savvy users guard against Facebook cyber attacks, many unwary users continue to …

Russian hackers stole millions from banks, ATMs

Tens of millions of dollars, credit cards and intellectual property stolen by a new group of cyber criminals. Group-IB and Fox IT, in a joint research effort, released a …

New Zeus variant targets users of 150 banks

A new variant of the infamous Zeus banking and information-stealing Trojan has been created to target the users of over 150 different banks and 20 payment systems in 15 …

Malware peddlers take advantage of Sony’s decision to pull controversial film

In the wake of Sony Pictures Entertainment’s decision to scrap the theatrical release of the controversial film “The Interview” altogether, cyber criminals …

Malware peddlers turn again to malicious links

In the continuous see-sawing that spammers and malware peddlers perform between sending out emails with malicious links and those with malicious attachments, the former method …

Top 5 malware attacks: 35 reused components

CyActive identified the top five malware that returned the highest ROI for hackers with the least effort per dollar — achieved by recycling code and using the same methods …

TorrentLocker exposed: Investigation and analysis

ESET researchers analyzed a widespread case of ransomware generally known as TorrentLocker, which started spreading in early 2014. The latest variant of the malware has …

Don't miss

Cybersecurity news