32m Twitter login credentials stolen from users
Leaked Source has added 32,888,300 records of Twitter users to its repository of leaked data. The source of the batch is a user who goes by the alias …
University pays $20,000 in ransomware attack
The ransomware plague has hit the University of Calgary, and the academic institution did what many victims do: they paid the ransom to get the encrypted files back. The …
US-bound travelers looking for a visa might get a RAT instead
F-Secure researchers have discovered that travelers who applied for a US Visa in Switzerland have recently been targeted by cyber-criminals wielding the latest version of the …
Stolen LinkedIn data used in malware campaign hitting European users
European LinkedIn users are being targeted with highly personalized malicious emails. It is more than likely that the attackers are misusing the compromised LinkedIn user data …
Malware exploits BITS to retain foothold on Windows systems
If you’re sure that you have cleaned your system of malware, but you keep seeing malware-related network alerts, it’s possible that at some point you’ve been …
FastPOS malware exfiltrates data immediately after harvesting it
POS malware might have taken a backseat when ransomware became the go-to malware for many cyber crooks, but stealing payment card information to effect fraudulent transactions …
789% year-over-year spike in malware and phishing
An analysis of phishing email campaigns from the first three months of 2016 has seen a 6.3 million increase in raw numbers, due primarily to a ransomware upsurge against the …
Unsurprisingly, malware incidents set to grow
Up to half of US organizations have experienced malware attacks which have had a severe impact on their business operations, according to new research by IDG Connect. Forty …
ICS-focused IRONGATE malware has some interesting tricks up its sleeve
FireEye researchers discovered a malware family that’s obviously meant to target ICS systems, but found no evidence that it was ever used in the wild. They were unable …
Malware devs scour GitHub for new ideas for bypassing Android security
Android malware developers are misusing techniques unearthed in GitHub projects to bypass security measures introduced in the latest versions of the mobile OS. GitHub, the …
Five tips to avoid getting hit by ransomware
Ransomware has emerged as the predominant online security threat to home users and small businesses. Delivered through spam or phishing emails that trick users into clicking …
ZCryptor ransomware spreads via removable drives
The newly spotted ZCryptor ransomware has also the ability to spread like a worm, Microsoft warns. Once it infects a system, it also copies itself on removable drives, in the …