Hackers Connected to NotPetya Ransomware Surface Online, Empty Bitcoin Wallet
Whoever is in control of the NotPetya bitcoin wallet has moved around $10,000 of funds, and a mysterious group has offered to unlock all of the ransomed files. Hackers connected to the disruptive world-wide ransomware attack that crippled Ukraine and hit computers all over the world have surfaced online. Bitcoin sent to the hackers by […] more…Erebus Resurfaces as Linux Ransomware
by Ziv Chang, Gilbert Sison, and Jeanne Jocson On June 10, South Korean web hosting company NAYANA was hit by Erebus ransomware (detected by Trend Micro as RANSOM_ELFEREBUS.A), infecting 153 Linux servers and over 3,400 business websites the company hosts. In a notice posted on NAYANA’s website last June 12, the company shared that the […] more…Helping Kids Understand the Foolishness and Consequences of Sexting
Sexting and teens. Nearly every week, the headlines reflect the attempt of citizens, educators, and lawmakers to tackle the question: What should the punishment be for teens caught sexting? In most states, officials may prosecute anyone, regardless of age, who creates, distributes or possesses an image of a minor engaged in sexual acts under that state’s […] more…Why Kids Use Secret Decoy Apps and Why Parents Should Care
Kids have been locking their diaries and hiding top secret shoe boxes since Sandy Olssen had a crush on Danny Zuko. The need for more and more privacy is a natural part of growing up. Today, however, some kids hide their private lives behind locked decoy apps catapulting those harmless secret crushes to a whole […] more…Yara Used to RickRoll Security Researchers
For most security researchers, Yara, a tool that allows them to create their own set of rules for malware tracking, is an invaluable resource that helps automate many processes. However, despite Yara’s reliability, it shouldn’t be the only tool used to monitor new versions of malware. This article will show why. There are many resources […] more…Feeling Overwhelmed, Parents? Here’s Your Online Safety Cheat Sheet
Can we just get an extra five hours tacked onto each day so we can stay on top of our kid’s online activity? That’s the rhetorical question most parents carry around unspoken. With all the to-dos of parenting, isn’t there a shortcut on all that social media stuff we don’t have to bookmark or save […] more…WannaCry ransomware used in widespread attacks all over the world
Earlier today, our products detected and successfully blocked a large number of ransomware attacks around the world. In these attacks, data is encrypted with the extension “.WCRY” added to the filenames. Our analysis indicates the attack, dubbed “WannaCry”, is initiated through an SMBv2 remote code execution in Microsoft Windows. This exploit (codenamed “EternalBlue”) has been […] more…Persirai: New Internet of Things (IoT) Botnet Targets IP Cameras
By Tim Yeh, Dove Chiu and Kenney Lu A new Internet of Things (IoT) botnet called Persirai (Detected by Trend Micro as ELF_PERSIRAI.A) has been discovered targeting over 1,000 Internet Protocol (IP) Camera models based on various Original Equipment Manufacturer (OEM) products. This development comes on the heels of Mirai—an open-source backdoor malware that caused some of the most […] more…Wired and Tired: 6 Ways to Restore What Technology Zaps
I pictured myself at this stage of parenting sitting in a dark forest Yoda-like as younger mothers sheepishly approached in search of wisdom. But reality and time — especially in parenting — become the great equalizers, yes? Even though my kids are now 16 and 22, I more closely resemble a Yo-Yo than the ever-wise […] more…Wired and Tired: 6 Simple Ways to Restore the Things Technology Zaps
I pictured myself at this stage of parenting sitting in a dark forest Yoda-like as younger mothers looked to me for wisdom. But even though my kids are now 16 and 22, it’s confusion, not clarity that invades my decision making. And that whole Yoda thing? Yeah — never gonna happen. Raising kids of any age […] more…Court to force adult site to expose ‘pirating’ users
A porn company has found more than 1,000 copyright-infringing videos on Pornhub. Fair. But why isn’t Pornhub itself being held accountable? more…App Alert: What Parents Need to Know about Popular New App ‘Yellow’
The Yellow app icon Go pick up your child’s phone. Is there an app icon that is a solid, yellow square? While that little yellow square may look harmless, the app is growing in popularity among teens and already causing concern. Yellow is the new app that’s being called the ‘Tinder for teens,’ because it’s […] more…Unraveling the Lamberts Toolkit
Yesterday, our colleagues from Symantec published their analysis of Longhorn, an advanced threat actor that can be easily compared with Regin, ProjectSauron, Equation or Duqu2 in terms of its complexity. Longhorn, which we internally refer to as “The Lamberts”, first came to the attention of the ITSec community in 2014, when our colleagues from FireEye […] more…Distracted Driving: Is Your Life (or Someone Else’s) Worth that Text?
“We had talked about it and talked about it so many times, but she never thought anything like this would happen to her,” said the mom of 18-year-old Kassie. “She would say she was good enough at texting; that she was fast at it. But it doesn’t take that long—all it takes is a couple […] more…Trust Under Fire: How to Help Your Kids Understand Trust in a Digital World
Just about everything comes down to trust, especially in a hyper-connected, share-happy digital culture. We pay strangers to Uber us, we Airbnb our vacations, we eBay our purchases, Venmo money to friends, and eHarmony our soul mates. It’s efficient, brilliant, and dicey all at the same time. This social landscape presents parents with a mound […] more…Picture Perfect: How to Help Your Teen Survive an ‘Instagram-Ready’ World
As the mom of a teenage girl, I have a front row seat to the good, the bad, and the mind-blowing ways social media influences teens. The struggle to fit in with peers that every teen generation is tasked to navigate has only proliferated with technology. Now it’s not just presenting your best self at […] more…More information
- LilyJade Version 2.0 – Malicious Browser Extension
- Is Multi-Cloud the Ultimate Use Case for the Zero Trust Model?
- Update: Penn State Schuylkill Router Upgrade
- Linksys brings fastest Wi-Fi router ever to market
- More Adware and PLANKTON Variants Seen in App Stores
- Privacy concerns after Instagram’s acquisition by Facebook
- Going to IP EXPO this week? Want a free T-shirt?
- LDAP Directory Service Maintenance
- VMware Says No Evidence of Zero-Day Exploitation in ESXiArgs Ransomware Attacks
- British Hackers Target Falklands Computer Game