An Arkansas lawyer found out that the cops had sent him a hard drive filled with malware that could be used for spying purposes.
Scammers love Facebook because it provides them with a place to try out their scams in front of an audience of over a billion people. Many old and new scams surface on the network giant every day and many people get tricked. Here’s what you need to keep an eye out for.
Several government and private agencies target the Beebone botnet which has infected over 12,000 computers. Europol has claimed that they have successfully ‘sinkholed’ the botnet by registering, suspending or seizing all domain names with which the malware could communicate and traffic was then redirected.
A popular Chrome extension known as Webpage screenshot starts collecting sensitive user information a week after installation for financial benefits. The sleep-activate feature of this spyware allows it to evade security measures, which highlights a greater issue with the current app/extension verification system.
Have you received an email recently with an unusual attachment? It may be the trojan downloader waski, disguised as a pdf file. This banking trojan steals login credentials by directing users to modified versions of bank websites. It can also directly intercept the traffic containing login information in most popular browsers like Chrome and IE.
A new variant to the PClock ransomware has emerged that targets a large number of file extensions. The locked files can be retrieved by using Emsisoft’s decryption tool.
Popular adult website Xtube has been compromised. The website has been injected with malicious code which exploits Flash on unpatched systems to drop malware like Cryptowall.
Banking trojan Vawtrak is attacking banks and financial institutions in Canada. The financial malware uses a man-in-the-middle attack to steal information but also has advanced capabilities like remote desktop control, botnet creation and more.
Like most other variants of ransomware, VaultCrypt encrypts files, but instead of directly asking for a ransom, it directs users to their so called “customer support” website.
Almost 50% of all Android devices are vulnerable to an Installer hijack. This may lead to unauthorized installation of adware or malware.
At a recent security conference researchers suggest BIOS malware is a lively and pertinent threat. The LightEater bug can be exploited to compromise millions of systems from popular manufacturers like HP, ASUS, Dell and Lenovo.
Europol conducted an operation against a massive botnet called Ramnit and managed to shut down several servers, which will hopefully turn out to be a major setback for the cyber criminals behind this zombie network.
Hackers placed ransomware ads on the Huffington Post website demanding for USD$300.
The spam emails try to lure users with misleading, fake invoices from banks, telephone companies and even PayPal in order to steal bank account credentials.
Ransomware ‘Cryptowall 2.0′ is using the TOR network to mask its tracks. It encrypts users data and asks for ransom in return for the key to unencrypt the data.
Microsoft warns that hackers are using email to phish for users to turn on the macro features in Microsoft Office in order to install malware.
It has been discovered that a Chinese smartphone company by the name of Coolpad has loaded Android phones with malware that steals information, installs apps and can disable system features.