Researchers have devised a system that can recognize a user's keystrokes by exploiting available WiFi signals. Using these attacks, under the right set of circumstances, hackers or other criminals could potentially monitor what you are typing purely on WiFi signals.
A new attack is targeting Linux users called FairWare ransomware where the attackers hack a Linux server, delete the web folder, and then leave a ransom note. The attackers then require the victim to pay 2 bitcoins in order to get their files back. It is unknown if the attackers still have a victim's files.
This course is designed to prepare you for the Microsoft MCSA Windows Server 2012 Certification exam. This prep course will teach you the skills you need to pass the MCSA Windows Server 2012: 70-410, 70-411, and 70-412.
Ransomware is running rampant! This week we have 10 stories, with 6 new ransomware, a decryptor, Locky being distributed as a DLL, and more. Pop culture ransomware continues to be the "thing" as new Purge and Pokemon based ransomware were also released this week.
Over the past few days, the Locky / Zepto developers have switched to using a DLL to install the Locky Ransomware rather than an executable. This is probably being done for further obfuscation and to bypass executable blockers as rundll32.exe is typically white listed.
The Domino Ransomware is a new infection discovered by Daniel Gallagher and Michael Gillespie that is based off of the Hidden Tear open-source ransomware project. This ransomware is distributed as a KMSpico installer, encrypts your files with the .Domino extension, and contains a ransom note with a cow in it.
Hospitality chain Millennium Hotels & Resorts North America is warning customers that malware may have affected food and beverage point-of-sale (POS) systems at 14 of its locations. MHR first learned about a possible malware infection, which is believed to have occurred in early March 2016, from the United States Secret Service.
Typically when information security firm's discover vulnerabilities in hardware, they disclose them to the manufacturer so that they can be fixed. Healthcare security firm, MedSec, is breaking from this norm and instead shared this information with the Muddy Waters Research firm who has shorted the stock based on this information.
A new deal is available for 95% off the Ultimate Computer Security Course Bundle. This 7-course bundle will give you a comprehensive background - and certifications - in IT security, ethical hacking, Voice over IP security, data security, and more.
Today, Apple released the iOS 9.3.5 out-of-band security update, which fix vulnerabilities that allows attackers to remotely jailbreak an iPhone in order to to install spyware. First discovered by Citizen Lab and Lookout, these vulnerabilities are being used by attackers to install the Pegasus spyware on a target's iPhone.
A new ransomware called Fantom was discovered by AVG malware researcher Jakub Kroustek that is based on the open-source EDA2 ransomware project. The Fantom Ransomware uses an interesting feature of displaying a fake Windows Update screen that pretends Windows is installing a new critical update while its encrypting files.
For the first time ever, researchers have detected an Android botnet leveraging a Twitter command-and-control (C&C) account to manage communications across all enslaved devices.
The Essentials of Information Security Kit brings together the latest in information, coverage of important developments, and expert commentary to help with your Information Security related decisions. Using this information can make better informed decision on your security strategy in order to protect your employees and business.
As part of the NoMoreRansom.org initiative, the National High Tech Crime Unit of the Dutch Police were able to seize the Command & Control server for the WildFire Locker ransomware. This allowed them to recover approximately 5,800 decryption keys that were used by McAfee and Kaspersky to create free decryptors for WildFire victims.
U.S. intelligence officials think hackers working for Russia perpetrated a series of alleged intrusions targeting reporters at The New York Times and other media outlets.
With both Pokemon and Mr. Robot based ransomware released this month, integrating pop culture into ransomware is a dominant theme this month. The new Globe Ransomware is no exception with malware developers basing their ransomware on the popular Purge movies.
According to a representative from LeakedSource.com, an alleged data dump of accounts from Unreal Engine and Epic games are being traded on the darkweb and underground communities.These data dumps consist of 530,590 leaked user accounts from the Unreal Engine forum and 277,944 leaked user accounts from the Epic Games forum.
Germany and France feel the makers of encrypted messaging apps like Telegram and Signal should help fight Islamic State terrorists, and they're pushing for Europe-wide rules to make that happen.
A new ransomware called Alma Locker has been discovered by Proofpoint researcher Darien Huss that encrypts a victim's data and then demands a ransom of 1 bitcoin within five days.
A new deal is available for 96% off the Enterprise COBOL Programming Bundle. This 2 course bundle contains 14 hours of instruction on how to program in Cobol for the enterprise. As shown by recent reports, Cobol is still heavily used by both government and corporate organizations and are in high demand.