Friday, December 15, 2017
malicious macros

Malicious Macros Get a Makeover

Since their emergence in the 'nineties, malicious macros have been a valuable tool for hackers. After M/S Office 2007, the default setting was to disable macros, and this resulted in a...
teslacrypt unlocked

Teslacrypt is Dead, Master Decryption Key Published

Yesterday, a security researcher from ESET found out that the popular TeslaCrypt ransomware operation is shutting down. Currently, the malware is offering a free decryption key to anyone who needs his...
furtim malware

Modern Malware Evolves, Evades AV Detection

Clever new credential-thief aces Latin and flunks VirusTotal tests 'By stealth' in Latin is Furtim. There has emerged a malware which can steal credentials though as yet has a VirusTotal detection of...
phone logs

Basic Phone Logs Can Leak Personal Data

US security researchers report that basic phone logs can be a real threat to the personal privacy of the ordinary citizens.By using anonymous “metadata” on people’s calls and texts, two experts...
online trust

New Survey: Online Trust Decreasing Fast

Approximately 80 million Americans were notified of the Anthem health data breach last year. Presently, it is crystal clear that the dual pillars of online privacy and security are having a...
ddos

Web Attack Causes Massive Site Outages

NS1 is hit by prolonged attack causing disruption in the U.S, Europe and Asia On Monday, hackers launched an attack against the prominent network provider NS1 which effected access to high-profile sites...
windows defender expanded

Microsoft Expands Windows Defender Advanced Threat Protection

Microsoft has made their best to highlight the security feature of their Windows 10.In fact, security is something which is of key importance to everyone, but especially the enterprise customers.This year...
tech support

Tech Support Scam Borrows Ransomware Tactics

Fake support scam demands cash for locked screen Scammers pretending to be Microsoft technical support are old hat. It used to be that they would give a user a call, telling that...
locky hacked

Locky Ransomware Network Hacked Again!

'Locky' sounds like a cute nick-name, though the reality of this ransomware is quite the opposite. It infects a machine (and any network shares), then encrypts files. A ransom is then...
skimer

Skimer Malware Gets Stealth Update to Hack ATMs

An updated version of Skimer has emerged. This is malware that was first seen around seven years ago, configured to hack Windows-based cash machines. After infection, it can either dispense cash,...