New TeslaCrypt Ransomware Uses More Exploit Kits As Infection Vector
The new Internet Security Threat report from Symantec shows that the growth of file-encrypting ransomware expanded from 8,274 in 2013 to 373,342 in 2014. This is 45 times more ...
Keeping you updated on the latest ransomware attack vectors, strains, decryptors, families and trends to help you avoid becoming infected.
The new Internet Security Threat report from Symantec shows that the growth of file-encrypting ransomware expanded from 8,274 in 2013 to 373,342 in 2014. This is 45 times more ...
In this Wednesday, April 1, 2015 photo, Jeff Salter, CEO of Caring Senior Service, poses for a photo in his company office building in San Antonio. Last December, the network of nearly 30 ...
Wall Street Journal Video About Ransomware and Botnets The WSJ asked itself: Who Will Cybercriminals Target Next? (click on the picture to see the video at the WSJ website). ...
New Ransomware CrypVault Evades AV With Simple Batch Scripts A new ransomware strain dubbed CRYPVAULT by Trend Micro is being spread as an email attachment. It's currently focusing on ...
TEWKSBURY – Last December Tewksbury Police confronted a new, and growing, frontier in cyberterrorism when the CryptoLocker ransomware virus infected the department’s network, encrypting ...
The cyber-mafia is stepping up the pressure. As you know, there are several competing gangs that are furiously innovating in an attempt to grab as much money as possible. Call it a ...
Susan Hansen at Bloomberg business reported that cyber attacks upend the attorney-client privilege.
Ask security experts what to do when hit with ransomware -- the sophisticated malware that infects a device or network, uses military-grade encryption to restrict access, and demands ...
Ransomware: Pay Up Or Fight. What Would You Do? Ask security experts what to do when hit with ransomware -- the sophisticated malware that infects a device or network, uses military-grade ...
Used to be that ransomware only looked at hard drive C:, and then any other mapped drives like D:, E:, F: etc., but now a whole new malicious strain that has stolen the same look & ...
A new CryptoWall attack wave has hit end-users with phishing emails containing malicious .chm attachments that infect networks with the latest and most sophisticated file-encrypting ...
How does ransomware actually work? Ransomware attacks cause downtime, data loss, possible intellectual property theft, and in certain industries a ransomware attack is considered a data ...
The massive success of CryptoLocker starting September 2013 has spawned a number of rapidly growing ransomware families. More recent versions of this malware have learned a number of ...
Security researchers at venture-backed Fairfax, Virginia-based Invincea have discovered a new Russian ransomware strain they called "Fessleak" which delivers its malicious code straight ...
Jerome Segura at MalwareBytes was the first to report about a phishing attack that uses a fake "Chrome Update" to trick end-users into installing ransomware on their workstation. So, I ...
Now this is a whole new wrinkle in criminal ransomware. Malicious hacker crews have started taking over whole websites, injecting some code to file-by-file first encrypt and then decrypt ...
OK, Heads-up! Here is the deal. The FBI and the Internet Crime Complaint Center (IC3) two days ago warned about a new version of a man-in-the-middle scam that targets your CEO, CTO, CFO, ...
There is a new version of CryptoWall out in the wild that I have dubbed "Version 2.1" because it has some powerful new features. Researchers at Cisco's Talos group published an analysis ...
January 9, 2015 - CBS This Morning News ran an item about ransomware featuring Shawn Henry, former FBI executive assistant director and president of cyber security firm CrowdStrike ...
Most small- and medium business owners think that they are not a target for cybercrime. Well, if you think you are safe because you are just a little fish in a big pond, think again. ...