Thursday, January 18, 2018
mobile payment

Mobile Payment Encryption Can Be Broken

Security researchers have proved that the encryption used by many mobile payment applications can be broken by simply measuring and analysing the electromagnetic radiation emanating from smartphones.“We show that modern cryptographic...
iphone exploit

iPhone Exploit Allows Hackers To Steal Users’ Data

The American cryptographer Matthew Green has just reported a zero-day flaw in Apple’s iMessage, and probably in other online Apple services.Apparently, the flaw lets a determined hacker shake loose photos and...
cryptolocker attack

Small Businesses Under Ransomware Attack

Service providers reported that the malicious CryptoLocker ransomware has temporarily crippled some small business owners over the past weeks.When a computer gets infected, CryptoLocker encrypts all the user's files on it...
new ctb-locker

CTB-Locker with New, Improved Version

An improved version of Onion ransomware has just emerged. No matter if you call it Onion or CTB-Locker, this is a Cryptolocker piece of malware which is capable of encrypting all...
samas ransomware

Samas Ransomware Infecting Whole Networks

Security researchers reported that a new ransomware has been using pen-testing/attack tools for a more targeted approach of getting installed on compromised systems.Samas ransomware (MSIL/Samas), appeared during the last quarter when...
teslacrypt 4.0

TeslaCrypt 4.0 With Bug Fixes, Decryption Impossible

A brand new version of TeslaCrypt 4.0 has just been released. The latest of the ransomware version was noticed by a security expert on 3/14/2016.Currently, the analysis of TeslaCrypt 4.0 has...
teamvewer spread ransomware

Hackers Spread Ransomware Via TeamViewer

According to security experts, most of the ransomware attacks are deployed through exploits, booby-trapped email attachments, or Microsoft Office loopholes, which occur when users are tricked into enabling macros. However, a...
unlock keys

Unnamed Ransomware Uses Backdoored Crypto API, Unlock Keys Available

Decryption keys for the malware was released by the software developer whose example encryption code was used by a strain of ransomware.The malicious software without a name encrypts users' files on...
radamant decrypt

Radamant C&C Server Flaw Allows Free File Decryption

A newly-found flaw in the Radamant command and control (C&C) server has allowed security experts to trick the malware into decrypting victims' machines for free.Radamant is a well-known ransomware kit on...
digital signature

Malware Gang Steals Certificates To Bypass Code-Signing Checks

Hacking operations depend on various factors. When it comes to the Suckfly gang, one of the key factors for such an operation is having lots of stolen code-signing certificates on hand...