Some Netflix Passwords Have Been Hacked
Logins and passwords that match Netflix accounts have been released by a separate company, Netflix said today in an email to affected customers. I found out via email, as IRead More →
Logins and passwords that match Netflix accounts have been released by a separate company, Netflix said today in an email to affected customers. I found out via email, as IRead More →
Who needs complicated malware when you have dynamite.Criminals like to use explosives to break into ATMs, rather than deploy malware, a recent European ATM Security Team (EAST) report has shown.Read More →
Sierra Wireless confirms that devices it manufactures were infected by Mirai. This week, the US government-backed ICS-CERT warned that the troubling new generation of computer attacks is powered by malware thatRead More →
Pork Explosion backdoor affects Foxconn-made devices. Some Android devices that contain firmware created by Foxconn may be vulnerable via a debugging feature left inside the OS bootloader, which acts asRead More →
Ransomware attack groups among the most frequent users of new tactic. Symantec has seen a major increase in the number of email-based attacks using malicious Windows Script File (WSF) attachmentsRead More →
In the first half of 2016 we noticed that Android banking Trojans had started to improve their phishing overlays on legitimate financial apps to ask for more information. Victims were requested toRead More →
The Exotic Ransomware is a new infection released by a malware developer going by the alias of EvilTwin or Exotic Squad. Discovered on October 12th by MalwareHunterTeam, the Exotic Ransomware will encrypt allRead More →
A Tweet posted recently by AVG researcher, Jakub Kroustek, suggested that a new ransomware, written entirely in Python, had been found in the wild, joining the emerging trend for PysomwaresRead More →
Malware author returns to IoT landscape following Mirai’s success and the wealth of vulnerable devices. The Krebs DDoS attacks have proven that the IoT landscape is a fertile ground that canRead More →
Podesta’s iPhone reportedly wiped within hours of his Twitter account being hacked. Unconfirmed evidence builds a strong case that an Apple iCloud account belonging to Hillary Clinton’s campaign chief, JohnRead More →