CryptoWall v4.0 released: Now encrypts the file names as well
Lawrence Abrams from the famous bleepingcomputer site wrote at Spiceworks: "CryptoWall 4.0 has been released that displays a redesigned ransom note, new filenames, and now encrypts a ...
Keeping you informed. Keeping you aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.
Lawrence Abrams from the famous bleepingcomputer site wrote at Spiceworks: "CryptoWall 4.0 has been released that displays a redesigned ransom note, new filenames, and now encrypts a ...
A brand new report from the Cyber Threat Alliance (CTA) showed the staggering damage caused by a single Eastern European cyber mafia. The CTA is an industry group with big-name members ...
We had a great time this year, but we had to keep it short because it was the last day of the month and things were super busy! We did have some time for our yearly parade to the local ...
A brand new report from Cyber Threat Alliance showed the staggering damage caused by a single criminal Eastern European cyber mafia. The CTA is an industry group with big-name members ...
Big-time computer hackers are after proprietary information: source code, pharmaceutical research, legal documents, chemical formulas, blueprints, product designs and other trade secrets ...
In-brief: The nation’s top law enforcement agency is warning companies that they may not be able to get their data back from cyber criminals who use Cryptolocker, Cryptowall and other ...
TalkTalk, a British phone and broadband provider with more than four million customers, disclosed Friday that intruders had hacked its Web site and may have stolen personal and financial ...
It's "Scam Of The Week" time to warn your users against phishing attacks that try to trick them into winning movie tickets for the new Star Wars movie. For the next 2 months this is going ...
Credit card numbers are small potatoes. Big-time computer hackers are after proprietary information: source code, pharmaceutical research, legal documents, chemical formulas, blueprints, ...
Larry Abrams at tech blog Bleeping Computer was the first one to report on this new wrinkle. The ransomware is called LowLevel04 and encrypts data using RSA-2048 encryption, the ransom is ...
CyberheistNews Vol #5 #45 Oct 20, 2015 Apple's OS X Security Honeymoon Is Over Unfortunately, bad guys are business people too. Their time is money, and they follow market leaders. By ...
Roger A. Grimes is an InfoWorld contributing editor. Roger holds more than 40 computer certifications and has authored eight books on computer security. He has been fighting malware and ...
The banks are promoting that the so called new "Chip & Pin" cards are much safer. They are also called the EMV chip system and touted to be secure. However, this technology is 15 ...
Unfortunately, bad guys are business people too. Their time is money, and they follow market leaders. By now, Apple's market share of desktop computers is close to 17 percent. OS X, ...
Healthcare pros surprisingly get very little security awareness training. Only 38 percent of these employees get security training at least twice a year -- 49 percent get training once a ...
*|CyberHeistNews|* CyberheistNews Vol #5 #43 Oct 13, 2015 Near-flawless Social Engineering Attack Spoiled By Single Error Steve Ragan at CSO has a great story about a CEO Fraud social ...
A front page article in the Wall Street Journal describes the escalating arms race for a possible cyberwar. This article is a great way to get C-level execs a crash course about ...
J. Peter Bruzzese is an InfoWorld columnist and five-time-awarded Microsoft MVP (current technical expertise Office 365, previous four years Exchange). He is a technical speaker, author ...
“You could spend a fortune purchasing technology and services, and your network infrastructure could still remain vulnerable to old-fashioned manipulation.” — Kevin Mitnick. Bad guys ...
Aaron Boyd wrote: "Determined not to fall victim to another network breach, the U.S. Postal Service is phishing its own employees, testing their ability to recognize a scam before it's ...