Free service helps CryptoLocker victims get their files back
FireEye and Fox-IT announced DecryptCryptoLocker, a new service assisting victims of the CryptoLocker ransomware. Available immediately for no cost, the service can offer help …
Detect threat patterns across your web and mobile assets
During the Black Hat conference in Las Vegas, RiskIQ announced an automated platform with global reach that enables organizations to discover, scan for malware and gather …
Android RAT impersonates Kaspersky Mobile Security
A clever malware delivery campaign impersonating well-known AV vendor Kaspersky Lab is actively targeting Polish Android users. It all starts with a spam email sporting the …
How to foil SynoLocker and minimize the damage
We wrote on Monday warning about Synology NAS users being targeted with SynoLocker, a customized version of the Cryptolocker ransomware, which encrypts the files contained on …
Poweliks malware creates no files, lays low in the registry
For most malware, performing their malicious task(s) is the primary goal, and a close second is to stay unnoticed on the system for as long as possible. As developers of …
Synology NAS users hit with Cryptolocker variant
You know that your products are getting to be very popular when cybercriminals target users with a customized version of the Cryptolocker ransomware. The products in question …
Retailers warned of attacks using hard-to-spot PoS malware
Retailers, beware: cyber crooks are increasingly targeting remote desktop applications by brute-forcing passwords, and are using that access to plant hard-to-detect PoS …
Top 10 Facebook scams
American singer and actress Taylor Swift has lost her scam mojo, as her fake sex tape spreading on Facebook was excluded from the top ten most successful scams, according to …
Malicious USB device firmware the next big infection vector?
Researchers from German security consultancy SR Labs have created a whole new class of attacks that can compromise computer systems via ubiquitous and widely used …
PC gamers increasingly under attack
Many gamers either disable their security or remove it altogether, thereby sacrificing protection to maximize system performance and leaving themselves vulnerable to …
Android Fake ID bug allows malware to impersonate trusted apps
The Bluebox Security research team has unearthed another critical Android vulnerability. Named “Fake ID,” the security bug can be used by malicious applications to …
AV engines are riddled with exploitable bugs
A security researcher has found a great number of exploitable vulnerabilities in popular security solutions and the AV engines they use, proving not only that AV engines are …
Featured news
Sponsored
Don't miss
- The number of Android memory safety vulnerabilities has tumbled, and here’s why
- New MIT protocol protects sensitive data during cloud-based computation
- AI use: 3 essential questions every CISO must ask
- Compliance management strategies for protecting data in complex regulatory environments
- Rethinking privacy: A tech expert’s perspective