Friday, September 22, 2017
Tor browser

New Techniques For Fingerprinting Tor Browser Users

Usually, PC users who want to remain anonymous online use Tor Browser. However, despite the fact that this browser hides users' IP addresses, cyber criminals have found some methods to identify...
malware attacks au banks

Four Australian Banks’ Two-factor SMS Codes Stolen by Malware

Australian largest banks are the main target of an Android attack which steals banking details and thwarts two-factor authentication security.The customers of National Australia Bank, ANZ Bank, Commonwealth Bank and Westpac...
burrp.com hacked

Burrp.com Compromised, Serves Teslacrypt Ransomware

It is a common fact that hackers often use exploit kits to locate vulnerabilities in the systems and infect users with malware.What an exploit kit does is to open a medium...
locky ransomware surge

Big Surge in Locky Ransomware Distribution

Locky is known as the new ransomware family which appeared a few weeks ago and already made a progress in its activity.According to security researchers, Locky has turned into a commonly...
ransomware trend

Report: New Ransomware Attacks Will Become Common in 2016

Based on the severe ransomware attacks lately, the Institute for Critical Infrastructure Technology (ICIT) warns users that ransomware threats will probably escalate this year.The ICIT report shows that 2016 will be...
ransomware growth

Crypto-ransomware Counts 83 per cent of Overall Ransomware

Cyber criminals have been overtaking Australia with Crypto-ransomware during the past few months.According to researchers' security roundup report, Crypto-ransomware increased to 83% of overall ransomware use in 2015. The same report...
keranger ransomware

KeRanger Ransomware is a Mac Ported Linux.Encoder Malware

Security researchers revealed that the newly-created KeRanger Mac ransomware is actually a rewrite of the ransomware variant that's been plaguing Linux servers during the past five months.After making detailed analysis on...
polymorphic malware

Polymorphic Malware Count Rising Tsunami-Like

Over the past year, security researchers have scanned over 27 billion URLs, 600 million domains, 4 billion IP addresses, 20 million mobile apps, 10 million connected sensors, and took a look...

KeRanger Mac Ransomware Aims to Encrypt Backups

According to security experts, the first ransomware targeting Macs contained hints that the cyber-criminals were working on a way to encrypt backups in an attempt to force payment. The researchers also...
alt text here

Java Cross-OS Malware Discovered, Linux and OS X Vulnerable Too

Most people know that Java JAR files will run on the three major platforms - Mac, Linux, and Windows, and even on Android devices under special conditions.Usually, developers disguise malware as...