Look Into Locky
Locky is a new ransomware that has been released (most probably) by the Dridex gang (source). Not surprisingly, it is well prepared, which means that the threat actor behind itRead More →
Locky is a new ransomware that has been released (most probably) by the Dridex gang (source). Not surprisingly, it is well prepared, which means that the threat actor behind itRead More →
Short Bytes: Brazilian police have arrested Diego Dzodan, Facebook’s Latin American regional vice-president, for failing to provide WhatsApp messages related to a case of drug-trafficking. In response, Facebook has said that WhatsAppRead More →
Spam campaign baits users with Visa Total Rewards emails containing malware that leads to Trojan.Cryptolocker.N infections. Spam related to credit cards is a typical scam observed on a daily basis. SomeRead More →
Security experts presented the DROWN attack that exploits a new critical security vulnerability affecting the OpenSSL. Security experts have discovered a new critical security vulnerability affecting the OpenSSL, it hasRead More →
Spam posts on Facebook are nothing new. Since videos continue to be a staple form of entertainment—a whopping 8 billion views per day according to last year’s numbers—within the socialRead More →
Pi will still run 32-bit operating systems, but it’ll be 50% faster. The third major version of the Raspberry Pi will go on sale Monday, with the $35/£30 credit card-sized RaspberryRead More →
Incident occurred after employee responded to e-mail phish scam. In a blog post on Sunday, Snapchat executives revealed that the payroll data of some current and former employees was exposed asRead More →
Until recently, sample wasn’t detected by any of the top antivirus programs. Researchers have uncovered what appears to be newly developed Mac malware from HackingTeam, a discovery that’s prompting speculation thatRead More →
4.1% of all sanctioned cloud apps are laced with malware. During the past month, cloud security analysts have seen more and more malware spreading from one PC to another in aRead More →
If your corporate network is connected to the Internet, you are doing business on the Internet, you manage web applications that keep confidential information or you are a provider ofRead More →