Locky Virus Reemerges with a New Variant, Ykcol Ransomware It is impossible to miss the news about Locky Ransomware because it keeps being resurrected from the dead again and again. While this infection stayed dormant for a big portion of
Continue reading 0 CommentsMalicious Parties Expected to Use Your System’s Resources Using Coinhive
Coinhive has recently offered website owners to monetize their businesses using a JavaScript miner that employs visitors’ CPU power to mine cryptocurrency. The tool is meant to mine XMR (a cryptocurrency also known as Monero) directly from the browser, which,
Continue reading 0 CommentsCyber Crooks Manage To Compromise CCleaner 5.33 Version
The well-known and popular CCleaner PC optimizer software developed by Piriform Ltd. was compromised and its 5.33 version contained serious malicious code, a backdoor. This could have made severe damage to millions of unsuspecting computer users since this malicious version
Continue reading 0 CommentsLocky Developers Sent Out 23 Million Emails Containing Lukitus Ransomware Variant In Just 24 Hours
Locky Ransomware Resurges Again Using 23 Million Corrupted Emails Locky Ransomware is one of those infections that continue to resurface periodically. Once the developer of this malicious threat realizes that the used distribution methods stop working – and that might
Continue reading 0 CommentsAnother Critical Vulnerability In Apache Struts 2 Allows Criminals To Hack Web Servers
New Apache Struts 2 Vulnerability Targets Servers A new vulnerability has been found in Apache Struts 2 (vulnerability code is CVE-2017-9805), and open-source web application framework created to develop Java applications. This is not the first time a serious vulnerability
Continue reading 0 CommentsEquifax Confirms Data Breach That Puts 143 Million Americans At Risk Of Identity Theft
143 Million Equifax Customers Become Victims of a Massive Cyber-Attack Equifax, an Atlanta-based consumer credit reporting agency, has confirmed that a massive cyber attack has led to one of the biggest data breaches in the US history. It is believed
Continue reading 0 CommentsPre-2017 versions of Amazon Echo can be turned into eavesdropping devices
In August 2017, security researcher Mark Barnes released his analysis on the Amazon Echo, a home assistance device that enables users to voice-control other smart devices. The device listening to your everyday conversations by default can be turned into a
Continue reading 0 CommentsRansomware Dominated the Second Quarter of 2017
Ransomware Dominated the Second Quarter of 2017 Misleading tech-support scams, pontifically unwanted programs, advertising-supported software, banking Trojans, and malvertising attacks were as prevalent in Q2 of 2017 as ever, but no threat gained as much attentions as ransomware, which, undoubtedly,
Continue reading 0 CommentsM.E.Doc Servers Found Responsible for Spreading NotPetya Ransomware
NotPetya, Petna, PetrWrap, EternalPetya, Diskcoder.C, ExPetr, PetyaBlue, PetyaWrap, SortaPetya, Nyetya. These are few of the many names that the infamous ransomware is known by. The threat hit at full force on June 27, and it was estimated that it helped
Continue reading 0 Comments