A new version of the Cerber Ransomware has been discovered by AVG security researcher Jakub Kroustek that switches from the .CERBER2 extension to .CERBER3 for encrypted files. When testing the new sample, there was some minor differences between this version and the previous version.
This bundle includes 6 courses, with over 43 hours of training, that teaches how how to program in C, C#, and C++. These courses are normally priced at $1,800.00, this deal has been discounted 97% to $44.99. A certificate of completion will be provided at the end of these course, but an exam voucher is not included..
Tech support scammers have devised a slew of new tricks with which they hope to trick unsuspecting Google Chrome users. Malwarebytes have uncovered a new technique that tech support scammers can use to make it look like the site you are visiting a legitimate one, rather than one under the scammers control.
Researchers have devised a system that can recognize a user's keystrokes by exploiting available WiFi signals. Using these attacks, under the right set of circumstances, hackers or other criminals could potentially monitor what you are typing purely on WiFi signals.
A new attack is targeting Linux users called FairWare ransomware where the attackers hack a Linux server, delete the web folder, and then leave a ransom note. The attackers then require the victim to pay 2 bitcoins in order to get their files back. It is unknown if the attackers still have a victim's files.
This course is designed to prepare you for the Microsoft MCSA Windows Server 2012 Certification exam. This prep course will teach you the skills you need to pass the MCSA Windows Server 2012: 70-410, 70-411, and 70-412.
Ransomware is running rampant! This week we have 10 stories, with 6 new ransomware, a decryptor, Locky being distributed as a DLL, and more. Pop culture ransomware continues to be the "thing" as new Purge and Pokemon based ransomware were also released this week.
Over the past few days, the Locky / Zepto developers have switched to using a DLL to install the Locky Ransomware rather than an executable. This is probably being done for further obfuscation and to bypass executable blockers as rundll32.exe is typically white listed.
The Domino Ransomware is a new infection discovered by Daniel Gallagher and Michael Gillespie that is based off of the Hidden Tear open-source ransomware project. This ransomware is distributed as a KMSpico installer, encrypts your files with the .Domino extension, and contains a ransom note with a cow in it.
Hospitality chain Millennium Hotels & Resorts North America is warning customers that malware may have affected food and beverage point-of-sale (POS) systems at 14 of its locations. MHR first learned about a possible malware infection, which is believed to have occurred in early March 2016, from the United States Secret Service.
Typically when information security firm's discover vulnerabilities in hardware, they disclose them to the manufacturer so that they can be fixed. Healthcare security firm, MedSec, is breaking from this norm and instead shared this information with the Muddy Waters Research firm who has shorted the stock based on this information.
A new deal is available for 95% off the Ultimate Computer Security Course Bundle. This 7-course bundle will give you a comprehensive background - and certifications - in IT security, ethical hacking, Voice over IP security, data security, and more.
Today, Apple released the iOS 9.3.5 out-of-band security update, which fix vulnerabilities that allows attackers to remotely jailbreak an iPhone in order to to install spyware. First discovered by Citizen Lab and Lookout, these vulnerabilities are being used by attackers to install the Pegasus spyware on a target's iPhone.
A new ransomware called Fantom was discovered by AVG malware researcher Jakub Kroustek that is based on the open-source EDA2 ransomware project. The Fantom Ransomware uses an interesting feature of displaying a fake Windows Update screen that pretends Windows is installing a new critical update while its encrypting files.
For the first time ever, researchers have detected an Android botnet leveraging a Twitter command-and-control (C&C) account to manage communications across all enslaved devices.
The Essentials of Information Security Kit brings together the latest in information, coverage of important developments, and expert commentary to help with your Information Security related decisions. Using this information can make better informed decision on your security strategy in order to protect your employees and business.
As part of the NoMoreRansom.org initiative, the National High Tech Crime Unit of the Dutch Police were able to seize the Command & Control server for the WildFire Locker ransomware. This allowed them to recover approximately 5,800 decryption keys that were used by McAfee and Kaspersky to create free decryptors for WildFire victims.
U.S. intelligence officials think hackers working for Russia perpetrated a series of alleged intrusions targeting reporters at The New York Times and other media outlets.
With both Pokemon and Mr. Robot based ransomware released this month, integrating pop culture into ransomware is a dominant theme this month. The new Globe Ransomware is no exception with malware developers basing their ransomware on the popular Purge movies.
According to a representative from LeakedSource.com, an alleged data dump of accounts from Unreal Engine and Epic games are being traded on the darkweb and underground communities.These data dumps consist of 530,590 leaked user accounts from the Unreal Engine forum and 277,944 leaked user accounts from the Epic Games forum.