Please turn on your JavaScript for this page to function normally.
Android
Screen overlay Android malware is on the rise

As predicted, the ability to lay screens over legitimate (e.g. banking) apps is becoming a crucial feature for the success of Android malware. The capability was first seen in …

Tor
Former Tor developer helped the FBI unmask Tor users

A developer who used to work at Tor Project is the mastermind behind “Torsploit” (aka “Cornhusker”), the malware that was used by the FBI in 2012 to …

LastPass
Fake Chrome LastPass extension leads to unwanted installs

A fake LastPass extension has been found lurking on the Chrome Web Store, offering promises of free and easy password management, but instead taking users for a ride involving …

danger
Cybercriminals increasingly exploiting human nature

Cybercriminals are exploiting human nature as they rely on familiar attack patterns such as phishing, and increase their reliance on ransomware, finds the Verizon 2016 Data …

cyber.police android ransomware
Exploit kit targets Android devices, delivers ransomware

Ransomware hitting mobile devices is not nearly as widespread as that which targets computers, but Blue Coat researchers have discovered something even less common: mobile …

money
Bangladesh Bank hackers compromised SWIFT software with bespoke malware

Bit by bit, indications about how the attackers who targeted Bangladesh’s central bank managed to take off with some $80 milllion (of the nearly $1 billion they aimed …

lighter
TeslaCrypt: New versions and delivery methods, no decryption tool

TeslaCrypt ransomware was first spotted and analyzed in early 2015, and soon enough researchers created a decryption tool for it. The malware has since reached versions 4.0 …

ransomwhere
Researcher develops tool that blocks OS X crypto-ransomware

In his spare time, security expert Patrick Wardle (who’s also director of R&D at Synack) creates OS X security tools. The latest addition to his collection is …

rings
Exploit kits: The rise in user-friendly malware

In past years, we’re seen a massive increase in the use of exploit kits. No website is too great to withstand the many powerful kits, with the Mail Online famously …

ransomware
The many faces and tactics of Jigsaw crypto-ransomware

The Jigsaw crypto-ransomware got its name from the main bad guy from the popular horror movie franchise Saw, as its initial ransom note (either in English or Portuguese) shows …

pyramid
Why a layered defense is your best protection against malware

As long as there is software there will be vulnerabilities and those vulnerabilities will be exploited. It’s a bold statement, and oddly enough technically incorrect. In …

vault
Ransomware attacks escalate, companies largely unprepared

Ransomware attacks against endpoints have recently taken place against hospitals in the US and Germany. Attacks have increased in severity to the point that the FBI issued an …

Don't miss

Cybersecurity news