How I Could Have Hacked Multiple Facebook Accounts
Let’s get into the nitty-gritty. The only way you can reset your password on Facebook (if you’ve forgotten one) is through entering a 6 digit passcode. Well that’s 10⁶ =Read More →
Malware News | Infosec Blog | Information Security Tutorials
Let’s get into the nitty-gritty. The only way you can reset your password on Facebook (if you’ve forgotten one) is through entering a 6 digit passcode. Well that’s 10⁶ =Read More →
The Domino Ransomware is a new infection discovered by Daniel Gallagher and Michael Gillespie that is based off of the Hidden Tear open-source ransomware project. What makes this variant interesting is that it pretendsRead More →
One of the most active banking Trojans that we have observed recently in email and exploit kits is one often referred to as Ursnif or Gozi ISFB [6]. Thanks toRead More →
The Linux Trojan Linux.PNScan is back and it is actively targeting routers based on x86 Linux in an attempt to install backdoors on them. Yesterday I wrote about a new LinuxRead More →
A new ransomware called Alma Locker has been discovered by Proofpoint researcher Darien Huss that encrypts a victim’s data and then demands a ransom of 1 bitcoin within five days. There has been aRead More →
This week we’ve detected an unsophisticated piece of malware targeting mobile subscribers in North America. The malware termed a RAT (remote access tool) is being sent via SMS in theRead More →
With so much attention focused on the file encrypting-type ransomware it’s easy to forget the simpler variety, which pops up when your PC boots and won’t allow access to yourRead More →
DNSSEC is the best tool to protect against DNS hijacking and DNS cache poisoning but can be hijacked for DDoS attacks. Network security firm Neustar says that around 80 percentRead More →
Crooks are always creating new ways to improve the malware they use to target bank accounts, and now Brazilian bad guys have made an important addition to their arsenal: theRead More →
Exploit against Cisco’s PIX line of firewalls remotely extracted crypto keys. In a revelation that shows how the National Security Agency was able to systematically spy on many Cisco Systems customersRead More →