Big Surge in Locky Ransomware Distribution
Locky is known as the new ransomware family which appeared a few weeks ago and already made a progress in […]
Big Surge in Locky Ransomware Distribution Read More »
Locky is known as the new ransomware family which appeared a few weeks ago and already made a progress in […]
Big Surge in Locky Ransomware Distribution Read More »
Metamorphic coding of a virus will not automatically protect against detection by heuristic analysis, though in some cases it is
How Anti-virus Heuristic Detection Works Read More »
Based on the severe ransomware attacks lately, the Institute for Critical Infrastructure Technology (ICIT) warns users that ransomware threats will
Report: New Ransomware Attacks Will Become Common in 2016 Read More »
Cyber criminals have been overtaking Australia with Crypto-ransomware during the past few months. According to researchers’ security roundup report, Crypto-ransomware
Crypto-ransomware Counts 83 per cent of Overall Ransomware Read More »
Security researchers revealed that the newly-created KeRanger Mac ransomware is actually a rewrite of the ransomware variant that’s been plaguing
KeRanger Ransomware is a Mac Ported Linux.Encoder Malware Read More »
Over the past year, security researchers have scanned over 27 billion URLs, 600 million domains, 4 billion IP addresses, 20
Polymorphic Malware Count Rising Tsunami-Like Read More »
According to security experts, the first ransomware targeting Macs contained hints that the cyber-criminals were working on a way to
KeRanger Mac Ransomware Aims to Encrypt Backups Read More »
Most people know that Java JAR files will run on the three major platforms – Mac, Linux, and Windows, and
Java Cross-OS Malware Discovered, Linux and OS X Vulnerable Too Read More »
Over the past months, lots of people became victims of ransomware. For that reason, a Swiss security blog abuse.ch presented
A Swiss Security Blog Run Ransomware Tracker Read More »
The most impressive of the escape and evasion techniques employed by the Zeus trojan is its use of a stolen
The Evasion Techniques of the Zeus Trojan Read More »
Cerber is the name of a new strain of ransomware which takes creepiness to an upper level. The three files
Cerber Ransomware Voice Message: “Your files are encrypted” Read More »
A security company reported a brand new discovery about the world’s first ransomware which specifically attacks OS X machines. “This
Mac Ransomware is Born Read More »
Video Transcription Bitcryptor is a ransomware virus which means that it is going to encrypt your files and then ask
Decrypt BitCryptor Encrypted Files for Free (Video) Read More »
An Apple iOS-based malware came up on Nokia’s top malware 20 list for the first time. According to the latest
Nokia Included Apple Malware in Top 20 Malware List Read More »
Nowadays, malvertising is getting more and more sophisticated and smart. Among the latest methods being used lately, appears to be
Malvertisers Create Unique ID for Every Victim Read More »