The history of malware samples in numbers
Virus Bulletin came up with some interesting historical facts. In 1989, when the very first Virus Bulletin rolled off the press (produced in a black-and-white, printed pamphlet style), ...
Keeping you informed. Keeping you aware.
Stay on top of the latest in security including social engineering, ransomware and phishing attacks.
Virus Bulletin came up with some interesting historical facts. In 1989, when the very first Virus Bulletin rolled off the press (produced in a black-and-white, printed pamphlet style), ...
This week, Wall Street Journal MarketWatch reporter Priya Anand quoted me in an article she wrote about the new wave of ransomware phishing attacks.
This week I attended a webinar about Security Awareness Training hosted by David Monahan, Research Director Security and Risk Management of Enterprise Management Associates.
With system administrators in the crossfire between cybergangs who are wielding sophisticated ransomware like CryptoLocker on one side and CryptoDefense on the other, it's likely many of ...
Cyber security professionals are slowly but surely grabbing more and more military jargon. No surprises there, with a possible cyberwar brewing. The "kill chain" is a traditional warfare ...
You would think that after the recent few years of press showing the risks of the Internet that people would wise up. But no. To my astonishment it's getting worse, not better. Just have ...
As we said before, there is furious competition between cybergangs. Late February 2014 a copycat ransomware competitor to Cryptolocker was released which outdoes CryptoLocker. The malware ...
CyberheistNews Vol 4, # 13
The same cybergang that was sending alarming emails about people being evicted from their homes, and are to appear in court, have a new variant of their racket. It's a community "alert" ...
Today in the Wall Street Journal, reporter Leslie Scism quoted Bloomberg News that "Target's data breach 'was the equivalent of 10 free Super Bowl ads."
Companies that are recruiting new employees are being targeted through Monster Jobs. The bad guys are using malware called Gameover Zeus, security firm F-secure reported in a blog post ...
CyberheistNews Vol 4, # 12
As we said before, there is furious competition between cybergangs. Late February 2014 a copycat ransomware competitor to Cryptolocker was released which outdoes CryptoLocker. The malware ...
Great post about security awareness by Douglas B. Robison, Florida Blue, a 2014 CSO40 award recipient. Here is an excerpt:
This scam uses a combination of phishing emails and spoofed Caller ID scam calls. The scammers intimidate the victim, threaten with arrest, deportation or loss of a business or driver’s ...
Security researchers demonstrated zero-day exploits against Google Chrome, Microsoft Internet Explorer, Apple Safari, Mozilla Firefox and Adobe Flash Player during the second day of the ...
Dave Kearns posted March 18 that he's been fascinated by the information that keeps coming out of the Taget Stores data breach. He's got a great analysis, and he ends off with words that ...
CyberheistNews Vol 4, # 11
It was all over the news the last few days. Researchers with BAE Systems determined that Russian malware known as Snake dates back as far as 2006, instead of 2011 as initially presented ...