Friday, November 17, 2017
ransomware growth

Crypto-ransomware Counts 83 per cent of Overall Ransomware

Cyber criminals have been overtaking Australia with Crypto-ransomware during the past few months.According to researchers' security roundup report, Crypto-ransomware increased to 83% of overall ransomware use in 2015. The same report...
keranger ransomware

KeRanger Ransomware is a Mac Ported Linux.Encoder Malware

Security researchers revealed that the newly-created KeRanger Mac ransomware is actually a rewrite of the ransomware variant that's been plaguing Linux servers during the past five months.After making detailed analysis on...
polymorphic malware

Polymorphic Malware Count Rising Tsunami-Like

Over the past year, security researchers have scanned over 27 billion URLs, 600 million domains, 4 billion IP addresses, 20 million mobile apps, 10 million connected sensors, and took a look...

KeRanger Mac Ransomware Aims to Encrypt Backups

According to security experts, the first ransomware targeting Macs contained hints that the cyber-criminals were working on a way to encrypt backups in an attempt to force payment. The researchers also...
alt text here

Java Cross-OS Malware Discovered, Linux and OS X Vulnerable Too

Most people know that Java JAR files will run on the three major platforms - Mac, Linux, and Windows, and even on Android devices under special conditions.Usually, developers disguise malware as...

A Swiss Security Blog Run Ransomware Tracker

Over the past months, lots of people became victims of ransomware. For that reason, a Swiss security blog abuse.ch presented a new project, named Ransomeware Tracker.A brief description of the purpose...

Cerber Ransomware Voice Message: “Your files are encrypted”

Cerber is the name of a new strain of ransomware which takes creepiness to an upper level.The three files which this ransomware places on the user's desktop are called "# DECRYPT...

Mac Ransomware is Born

A security company reported a brand new discovery about the world’s first ransomware which specifically attacks OS X machines."This is the first one in the wild that is definitely functional, encrypts...

Nokia Included Apple Malware in Top 20 Malware List

An Apple iOS-based malware came up on Nokia's top malware 20 list for the first time. According to the latest Threat Intelligence Lab report by Nokia, it was due to XcodeGhost...

Malvertisers Create Unique ID for Every Victim

Nowadays, malvertising is getting more and more sophisticated and smart. Among the latest methods being used lately, appears to be fingerprinting. This is a great way to check the potential victims’...