Breaking News
Showing posts with label Malware. Show all posts
Showing posts with label Malware. Show all posts

Friday, 29 April 2016

Ransomware Virus Shuts Down Electric and Water Utility




Ransomware has become an albatross around the neck, targeting businesses, hospitals, and personal computers worldwide and extorting Millions of Dollars.

Typical Ransomware targets victim's computer encrypts files on it, and then demands a ransom -- typically about $500 in Bitcoin -- in exchange for a key that will decrypt the files.

Guess what could be the next target of ransomware malware?
Read more ...

U.S. Supreme Court allows the FBI to Hack any Computer in the World






In Brief
The US Supreme Court has approved amendments to Rule 41, which now gives judges the authority to issue search warrants, not only for computers located in their jurisdiction but also outside their jurisdiction.

Under the original Rule 41, let’s say, a New York judge can only authorize the FBI to hack into a suspect's computer in New York.

But the amended rule would now make it
Read more ...

Thursday, 28 April 2016

In-Brief: Telegram Vulnerability, Malware in Nuclear Plant, Anti-Tor Malware and Hotpatching Exploit





Clickjacking Vulnerability in Telegram Web Client
The official Telegram web-client that allows its users to access messenger account over desktop’s web browser is vulnerable to clickjacking web application vulnerability.

Egyptian security researcher Mohamed A. Baset told The Hacker News about a flaw in Telegram that could allow an attacker to change sensitive information of a Telegram user,
Read more ...

Former Tor Developer Created Malware for FBI to Unmask Tor Users






In Brief
According to an investigation, Matthew Edman, a cyber security expert and former employee of the Tor Project, helped the FBI with Cornhusker a.k.a Torsploit malware that allowed Feds to hack and unmask Tor users in several high-profile cases, including Operation Torpedo and Silk Road.

Do you know who created malware for the FBI that allowed Feds to unmask Tor users?

It's an
Read more ...

PLATINUM Hackers Hijack Windows Hotpatching to Stay Hidden






In Brief
The Microsoft’s Windows Defender Advanced Threat Hunting team detected that a cyber espionage group of hackers, known as PLATINUM, has found a way to turn the Windows's Hotpatching technique (a way of updating the operating system without requiring a restart) to hide its malware from Antivirus products.

PLATINUM group has been active since 2009 and launching large-scale attacks
Read more ...

Monday, 25 April 2016

How Did Hackers Who Stole $81 Million from Bangladesh Bank Go Undetected?






In Brief
Investigators from British defense contractor BAE Systems discovered that hackers who stole $81 million from the Bangladesh Central Bank actually hacked into software from SWIFT financial platform, a key part of the global financial system.

The hackers used a custom-made malware to hide evidence and go undetected by erasing records of illicit transfers with the help of compromised
Read more ...

Thursday, 21 April 2016

Creators of SpyEye Virus Sentenced to 24 Years in Prison






In Brief
Two International hackers, Aleksandr Andreevich Panin and Hamza Bendelladj, have been sentenced to a combined 24 years and 6 months in prison for their roles in developing and distributing SpyEye banking trojan, a powerful botnet similar to the infamous ZeuS malware.

Both hackers were charged with stealing hundreds of millions of dollars from banking institutions worldwide.

Read more ...

Wednesday, 20 April 2016

Researcher releases Free Ransomware Detection Tool for Mac OS X Users






In Brief:
Introducing RansomWhere, a free generic ransomware detection tool for Mac OS X users that can identify ransomware-like behavior by continually monitoring the file-system for the creation of encrypted files by suspicious processes.

This ransomware detection tool helps to block the suspicious processes and waits for the user to decide whether to allow or stop the process.

Read more ...

Tuesday, 12 April 2016

How to decrypt Petya Ransomware for Free





Ransomware has risen dramatically since last few years and is currently one of the most popular threats on the Internet.



The Ransomware infections have become so sophisticated with the time that victims end up paying ransom in order to get their critical and sensitive data back.



But if you are infected with Petya Ransomware, there is good news for you.



You can unlock
Read more ...

Warning! CCTV Cameras Sold on Amazon Come with Pre-Installed Malware





Be careful while buying any off-brand electronics from Amazon, as they could end up infecting you.



Recently, independent security researcher Mike Olsen discovered that the CCTV surveillance devices sold on Amazon came with pre-installed malware.



Olsen discovered this nasty secret after he bought a set of outdoor CCTV surveillance cameras from Amazon for one of his friends.



He picked
Read more ...

Wednesday, 6 April 2016

Adobe to issue Emergency Patch for Critical Flash Player Vulnerability





Adobe has been one of the favorite picks of the Hackers to mess with any systems devoid of any operating systems, as Flash Player is a front runner in all the browsers.



Hackers have already been targeting Flash Player for long by exploiting known vulnerabilities roaming in the wild.



Despite Adobe's efforts, Flash is not safe anymore for Internet security, as one more critical
Read more ...

Thursday, 31 March 2016

Advanced Malware targeting Internet of the Things and Routers





Anything connected to the Internet could be hacked and so is the Internet of Things (IoTs).



The market fragmentation of IoTs or Internet-connected devices is a security nightmare, due to poor security measures implemented by their vendors.



Now, the researchers at security firm ESET have discovered a piece of Malware that is targeting embedded devices such as routers, and other
Read more ...

Enable this New Setting to Secure your Computer from Macro-based Malware




Do you deal with MS Word files on the daily basis?

If yes, then are you aware that even opening a simple doc file could compromise your system?

It is a matter to think that the virus does not directly affect you, but it is you who let the virus carry out the attack by enabling deadly "Macros" to view the doc contents that are generally on eye-catching subjects like bank invoice.


How
Read more ...

Wednesday, 23 March 2016

Warning! Think Twice Before Using USB Drives




Security researchers have discovered a new data-stealing Trojan that makes special use of USB devices in order to spread itself and does not leave any trace of activity on the compromised systems.

Dubbed USB Thief ( or Win32/PSW.Stealer.NAI), the malware has the capability of stealthy attacking against air-gapped or isolated computers, warns ESET security firm.

The malware author has
Read more ...

Friday, 18 March 2016

Malvertising Campaign Hits Top Websites to Spread Ransomware





Hackers are always in search for an elite method to create loopholes in the cyberspace to implement the dark rules in the form of vulnerability exploitation.



Top Trustworthy sites such as The New York Times, BBC, MSN, AOL and many more are on the verge of losing their face value as a malwertized advertisement campaign are looming around the websites, according to SpiderLabs.



Here's
Read more ...

Thursday, 17 March 2016

Warning — Hackers can Silently Install Malware to Non-Jailbroken iOS Devices





Hard time for mobile phone users!

Just recently, two severe vulnerabilities in Qualcomm Snapdragon chip and Stagefright were spotted on the Android platform, affecting more than a Billion and Millions of devices respectively.

And now:

Hackers have discovered a new way to install malicious apps onto your iPhone without your interaction.



Researchers at Palo Alto Networks have uncovered a
Read more ...

Monday, 14 March 2016

Here's How Hackers Stole $80 Million from Bangladesh Bank





The recent cyber attack on Bangladesh's central bank that let hackers stole over $80 Million from the institutes' Federal Reserve bank account was reportedly caused due to the Malware installed on the Bank's computer systems.



Few days ago, reports emerged of a group of unknown hackers that broke into Bangladesh's central bank, obtained credentials needed for payment transfers from Federal
Read more ...
Designed By