Malware

New tech support scam launches communication or phone call app

A new tech support scam technique streamlines the entire scam experience, leaving potential victims only one click or tap away from speaking with a …

Identity Theft

Montgomery County (Ill.) government offices taken offline by malware

The Montgomery County Emergency Management Agency reported that much of the county's computer system went down last week due to what it is calling a …

Crime

This malware will steal your Twitter and Facebook accounts

A variant of the Zeus trojan isn't content with your banking details. It wants your social media logins, too.<p>A strain of malware based on the Zeus trojan has been modified to monitor and potentially take over your Facebook and Twitter accounts.<p>The malware, which was originally designed to steal …

Security

Advisory | Xplico Unauthenticated Remote Code Execution CVE-2017-16666

The goal of Xplico is extract from an internet traffic capture the applications data contained. For example, from a pcap file Xplico extracts each …

Information Security

New exploit uses antivirus software to help spread malware

One of the most basic rules of safe web browsing is to use antivirus software in order to keep your computer safe. While it’s a good idea to make use …

Security

WSC2

LAST/CURRENT VERSION: 0.1<p>Author: Arno0x0x - @Arno0x0x<p>WSC2 is a PoC of using the WebSockets and a browser process to serve as a C2 communication …

Microsoft Visual Studio

Trend Micro RansomBuster

<b>Pros</b><p>Folder Shield blocks unauthorized access to protected documents. Detects encrypting ransomware behavior in any folder. Recovers any files that …

Security

LockCrypt Ransomware Spreading via RDP Brute-Force Attacks

We previously reported on SamSam ransomware charging high ransoms for infected servers. But SamSam isn’t the only ransomware out there charging …

Ransomware

Best Linux Antivirus: Top 10 Reviewed and Compared

In the space of computer Operating System, there is always errors and problems especially intentionally made errors which we call trojan, malware, …

Linux

Anti-WebMiner for Windows will stop Cryptojacking Mining Scripts

Internet dangers and its types are evolving rapidly, while we are still trying hard to fight with malware, a new tricky threat called “cryptojacking” …

Security

Malware scanning of mobile apps needs serious help

Mobile users are advised to purchase apps from official sources, though it's clear that process is not infallible. Learn how malware gets into app …

Security

Kaspersky's antivirus software takes non-threatening files (updated)

Kaspersky's attempt to quash collusion fears through transparency isn't <i>quite</i> reassuring everyone. In an interview with <i>Reuters</i>, founder Eugene Kaspersky has acknowledged that his company's antivirus software has copied files that weren't marked as direct threats. In one example, the program removed …

Technology

Osama bin Laden's computer files riddled with malware

This news tidbit came out as the CIA made public 470,000 computer files recovered when U.S. Navy SEALS killed bin Laden in a May 2011 raid on his …

Security

Hexacorn | Blog

I have recently discovered a new trick that allows to execute code in other processes without using remote threads, APC, etc. While describing it, I …

Security

Chrome users beware: A new "Catch-All" extension could steal everything you type

A malicious Chrome extension is spreading in Brazil, and it's capable of stealing everything typed inside a browser window. Here's what to look out …

Security

Malicious Chrome extension steals all data

There’s a glut of malicious Google Chrome extensions out there, but some are more harmful than others. The one that SANS ISC incident handler Renato …

Security

OSX/Proton Malware is Back! Here’s What Mac Users Need to Know

Last May, a download server of popular video encoding software, called Handbrake, was compromised by malware. Users downloading Handbrake at the time …

Security

Latest Windows Update big security changes you need to know about

Have you installed the newest Windows 10 update yet? Aside from the numerous new features and tweaks it’s bringing, did you know that it’s …

Microsoft

The latest ransomware presents itself as an Adobe Flash Player download

A new strain of ransomware, called Bad Rabbit, began hitting organizations throughout Russia and Eastern Europe on Wednesday (Oct. 25). The malware is being spread through compromised websites, presenting itself as an Adobe Flash Player download.<p>“When users visited one of the compromised websites, …

Security

Bad Rabbit ransomware attacks computer networks masquerading as Adobe Flash

Stop me if you’ve heard this before, but a new ransomware program has emerged, which can spread through computer networks belonging to the same …

Adobe Flash

Kaspersky Software Caught Classified NSA Malware

Russian anti-virus company Kaspersky Lab has been increasingly vilified in the US for acquiring classified US government programs. This hs led to a …

Security

Tutorial: Enabling Ransomware Protection With The Windows 10 Fall Creators Update

Ransomware has, as of recently, become one of the most lucrative types cyberattacks to hit the World Wide Web. These past couple of years have seen …

Security

Kaspersky Says Suspected NSA Code Was Lifted From U.S. Computer

Russian cybersecurity giant Kaspersky Lab said it uploaded secret data linked to the National Security Agency from a personal computer in the U.S., …

Business

Windows 10 – How to configure file associations for IT Pros?

Hello, my name is Ismaël Limbada and I am a Support Escalation Engineer for Windows Core Team. This blog post is about file association configuration …

Linux

Kaspersky identifies other malware on NSA hacker's home computer

An internal investigation at the Russian anti-virus company into allegations that its software was used to steal NSA hacking tools has uncovered …

UK News

Windows 10's "Controlled Folder Access" Anti-Ransomware Feature Is Now Live

With the release of Windows 10 Fall Creators Update last week, the "Controlled Folder Access" that Microsoft touted in June is now live for millions …

Security

Stopping ransomware where it counts: Protecting your data with Controlled folder access

Windows Defender Exploit Guard is a new set of host intrusion prevention capabilities included with Windows 10 Fall Creators Update. One of its …

Security

Malware-Laced Apps Distributed to Mac Users

Security researchers have discovered that malware-infected apps have been distributed to hundreds of Mac users in a new software supply-chain …

Security

OSX Proton: Mac malware that allows hackers to spy and steal data spreading via hacked Eltima apps

The same Mac malware was previously spread by hackers via a popular Mac OS app called HandBrake.<p>A powerful Mac malware known as OSX Proton was …

Security

Hackers Distribute Malware-Infected Media Player to Hundreds of Mac Users

Yet another software supply-chain attack hits popular applications.<p>Hackers managed to compromise the website of a company that develops several popular apps for Apple computers, distributing malware-infected versions of those apps to hundreds of users.<p>Security researchers from antivirus firm ESET …

Security