Monday, June 26, 2017
Computer Security News

Computer Security News

blackshades ransomware

Black Shades Ransomware Demands Frugal $30 Ransom

A brand new ransomware threat which locks user files and asks for a ransom has been recently discovered by the security experts. The ransomware is called Black Shades Crypter and it...
locky spam campaign

New Malspam Campaign Delivers Locky Ransomware

Security researchers noted a follow up malspam campaign to the yesterday’s widespread campaign which was delivering Locky Ransomware. The attachment used in the latest campaign is another malicious zip file that contains...
cloud app

Warning: Business Cloud Apps are not Security Compliant

A Blue Coat Systems` analysis of 15,000 cloud application came back with a shocking outcome. As it turned out, 99% of the investigated apps didn’t comply with the standards to properly protect...
hackers exploit

Hackers Utilize New Exploit: Human Nature

According to the Verizon 2016 Data Breach Investigations Report, hackers have been constantly exploiting human nature by relying on well-known attack patterns such as phishing and massive ransomeware campaigns. The latest security...
NoMoreRansom

NoMoreRansom Initiative Expands With Private Sector Support

The NoMoreRansom initiative, which started in July this year, now has 13 new members. It was specially established by the Dutch National Police, Kaspersky Lab, Europol and Intel Security to help...

Teslacrypt Ransomware Campaign Attacks Skype Users

Lately, security experts revealed a new malvertising campaign which attacks Skype users. The campaign is usually mistaken for an accidental infection, however, it is not as harmless as it seems to...
mediaserver exploit

Hackers Can Pwn Your Android Smartphone With Just an Image

If you are an Android user you should know that there is a change an innocuous image on social media or a messaging application to completely compromise your mobile phone. The vulnerability,...
us capitol

Senators to Investigate Ransomware Trends

The increasing trend of cyber criminals who take users computers hostages and lock their files for ransom has been bothering the Senate Judiciary Committee to a great extent lately. Considering the increasing...
alt text here

Java Cross-OS Malware Discovered, Linux and OS X Vulnerable Too

Most people know that Java JAR files will run on the three major platforms - Mac, Linux, and Windows, and even on Android devices under special conditions. Usually, developers disguise malware as...

Hidden Tear Ransomware Used For Base of 24 Other Ransomware Strains

While being developed, a hidden encryption flaw has been left in the Hidden Tear ransomeware. Later on, Hidden Tear was used in the Linux.Encoder and Cryptear B. ransomware families, both of...