Meet CryptoWall, The New Ransomware Leader (with heatmap)
Malware comes in waves. CryptoLocker was the first major, vicious ransomware, and set off a bunch of copycats. Recently 16 competing ransomware gangs were identified. After CryptoLocker ...
Keeping you informed. Keeping you aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.
Malware comes in waves. CryptoLocker was the first major, vicious ransomware, and set off a bunch of copycats. Recently 16 competing ransomware gangs were identified. After CryptoLocker ...
Chase bank says to click links if you suspect phishing. Huh? Yup, they do. Check out this email from Chase, scratch your head, and do not make this error in your own organization. If you ...
This morning, the Wall Street Journal reported on the front page that J.P. Morgan was hacked and suffered a cyberheist called "a significant breach of corporate computer security".
The Proofpoint Threatinsight blog reported on something curious. They called their posting "Curiosity Clicks: Using Bitcoin’s hype for phishing fun" and came up with some interesting ...
CyberheistNews Vol 4, # 34
Cybersecurity as Realpolitik by Dan Geer at Black Hat USA 2014
August 22, 2014 - Nicole Perlroth at the New York Times wrote: "You are guilty of child porn, child abuse, zoophilia or sending out bulk spam. You are a criminal. The Federal Bureau of ...
Paul Thurrott over at WindowsIT Pro wrote:
Antone Gonsalves at CSO reported something that worries me, and this SHOULD NOT BE at this day and age.
VirusBulletin reported that cyber criminals now spread around Cryptolocker / CryptoWall via YouTube. The cyber criminals purchase advertising space and use exploit kits to infect ...
The Avast Blog reports a new "password stealer" feature in the Reveton ransomware. Reveton is the type of "police" lock/screen ransomware which falsely alerts users they've broken some ...
Gizmodo reported yesterday about a new study from the University of Michigan on the vulnerabilities of traffic lights which is shocking proof that we need to make some major changes, and ...
I was at Black Hat and left my email address at the Imperva booth. They sent me this and it's a very good little intro: "SQL injection attacks have been around for more than ten years … ...
CyberheistNews Vol 4, # 33
More than one-third of Canada’s IT professionals know – for sure – that they’d had a significant data breach over the previous 12 months that could put their clients or their ...
You are probably aware of the free one-time Email Exposure Check Pro (EEC Pro) we can run for you. We find all the email addresses of your domain that are out there available on the ...
n">(Reuters) - Community Health Systems Inc, one of the biggest U.S. hospital groups, said it was the victim of a cyber attack that originated in China, resulting in the theft of ...
WIRED magazine had the scoop, by directly talking to Edward Snowden recently. An NSA program known as MonsterMind, currently under development, is being designed to detect and stop cyber ...
iSIGHT partners discovered a new ransomware strain, which uses components of CryptoLocker and CryptoWall but underneath the surface, the code is completely different from these two ...
The scammers are at it, as expected. There is now a Facebook phishing message that invites users to click a link and see an "exclusive" video of Robin Williams saying goodbye through his ...
Last night, news broke that Robin Williams was found dead in his home in Marin County, CA. It is suspected that it was either a suicide or an overdose. This is a celebrity death that the ...
CyberheistNews Vol 4, # 32
Since September 2013, ransomware has become vicious and has inspired several copycats. At the time of this writing, summer 2014, the very first strains of second-generation ransomware ...
Researchers at FireEye and Fox-IT have managed to obtain the private encryption keys that the malware uses to lock files.
I was at Black Hat 2014, and Kevin Mitnick was also at at the show. He signed 700 books in a 3-hour span, whew! Here is the line that ran all the way back to the show floor. I took this ...
Are the credentials of one of your users among the stash of the 1.2 billion stolen passwords? A small Internet security company will tell you for just a 120 bucks per year. Their ...
CyberheistNews Vol 4, # 31
When your products get targeted with custom made ransomware, you know you've got it made. We're talking about NAS (network-attached storage) built by Synology in Taiwan. the malware has ...
This is a (very) short sci-fi story that looks at the cyber security risks of hooking up household appliances to the Internet. Warning - this is one grumpy man.
ComputerWorld in Australia reported on a very nice success where security awareness training prevented a major ransomware infection. They started out with: "People like to ask the ...