CrypMIC Ransomware Wants to Follow CryptXXX’s Footsteps
By Kawabata Kohei They say imitation is the sincerest form of flattery. Take the case of CrypMIC—detected by Trend Micro as RANSOM_CRYPMIC—a new ransomware family that mimics CryptXXX... more…A malicious pairing of cryptor and stealer
We have already seen some cryptor attacks where malicious programs with different functions have been used in combination. For example, one version of the Shade cryptor checks... more…IT threat evolution in Q1 2016
Download PDF version Q1 figures According to KSN data, Kaspersky Lab solutions detected and repelled 228,420,754 malicious attacks from online resources located in 195 countries all over... more…Wired Mobile Charging – Is it Safe?
...9.1 Default (locked) Windows 8.1 5 001 DN, DM, SN Default (locked) OS X 10.9 83 272 DN, DM, DT, SN, OS, ECID, device public key Unblocked + Paired Windows... more…Patch Tuesday of January 2017: Microsoft Releases Four Bulletins, One Rated Critical
Microsoft begins its monthly set of bulletins for 2017 with relatively few bulletins released in January. Four security bulletins make up this month’s Patch Tuesday—one of which is... more…Analysis: New Remcos RAT Arrives Via Phishing Email
By Aliakbar Zahravi (Malware Researcher) In July, we came across a phishing email purporting to be a new order notification, which contains a malicious attachment that leads... more…January 2013 Microsoft Security Bulletins – Start the New Year with XML Core Services, Print Spooler Updates and More
Microsoft starts the new year with a January Security Bulletin Release of seven Security Bulletins. These seven bulletins cover at least 11 CVE. Three of the vulnerabilities... more…Potential Targeted Attack Uses AutoHotkey and Malicious Script Embedded in Excel File to Avoid Detection
By: Hiroyuki Kakara and Kazuki Fujisawa, Cyber Threat Research Team We discovered a potential targeted attack that makes use of legitimate script engine AutoHotkey,in combination with malicious... more…Apple fan buys lunch with Tim Cook for $300,000
Fancy lunch with Apple CEO Tim Cook to find out about the iPhone 6, the firm’s plans for the long-rumoured iWatch or just what on earth he... more…Apple releases Java security updates
It's probably safe to turn your Mac on again. Just a day after reports spread about a Java-based Trojan horse that could install itself on your Mac without... more…Changes to Gmail’s Image Display Defaults May Change Your Privacy
Recently Google announced that it had changed its policy dealing with images in email. In a blog post on the official Gmail blog, Google said: [You’ll] soon see... more…Android is almost impenetrable to malware
Until now, Google hasn’t talked about malware on Android because it did not have the data or analytic platform to back its security claims. But that changed... more…WordPress Pluggable.php Being Compromised
The last few days we have seen a large number of WordPress sites compromised with a hidden malware payload that lands inside wp-includes/pluggable.php. This is not a WordPress... more…Kam dál?
- Microsoft Windows Graphics Component CVE-2019-1438 Local Privilege Escalation Vulnerability
- The GHOST in the machine – 60 Sec Security [VIDEO]
- Medical devices at risk: 5 capabilities that invite danger
- News in brief: flying cars take off; terrible passwords; Facebook picks Paris incubator campus
- British Intelligence Says Huawei Risk Manageable: FT
- Radware to Acquire Bot Mitigation Firm ShieldSquare
- Verodin carries out attacks safely to test network security
- Digital Parenting: ‘Eat Your Veggies, Brush Your Teeth, Strengthen Your Passwords’
- Compromised by Connection: 5G Will Unite Cities and Also Put Them at Risk
- AWS Provides Secure Access to Internal Assets With Amazon WorkLink