Please turn on your JavaScript for this page to function normally.
Government-grade malware used for ransomware attacks

It was only a matter of time until cyber criminals got their hands on a piece of government-made malware and repurposed it for their own criminal needs. Sentinel Labs …

CryptoLocker is temporarily disabled, users still at risk

Bitdefender warns that while CyptoLocker is currently disabled, it could come back to life at any moment. As such, users need to take precautions to protect against this …

Java program to reverse Android ransomware damage

University of Sussex student Simon Bell has reverse-engineered the Android Simplocker (Simplelocker) ransomware, and has created a Java program that can be converted into an …

Financial ransomware now targeting U.S. users

Although the GameOver Zeus botnet and CryptoLocker ransomware have been disrupted, it is still too early for a victory celebration. First, the two week deadline expires on …

Crypto-ransomware brings in quite a profit

Crypto-ransomware is quickly becoming cybercrooks’ favorite tool to extort money from computer users. After the amazing success of CryptoLocker, copycats have begun …

ESET analyzes first Android file-encrypting, TOR-enabled ransomware

One year ago, Android Defender, a hybrid comprising characteristics of a rogue AV and ransomware (the lockscreen type, not a file-encryptor) was discovered. Last month we saw …

Google Image Search results redirect to Browlock ransomware

Browlock is the most basic approach to ransomware there is: there is no actual malware that blocks the victims’ computer or encrypts its contents, there is only a Web …

New browser hijacker/click fraud malware threatens Windows users

In its latest Security Intelligence Report, Microsoft has noted that malware designed to make money for the attacker via click fraud, performing Bitcoin mining, and …

Small businesses targeted with email-borne exploits

Even though the data gathered by Microsoft points to the fact that cybercriminals now prefer deceptive tactics to exploits, it does not mean that the latter approach has been …

Malware peddlers prefer deceptive tactics to exploits

Cyber crooks are losing interested in exploits as an attack vector, and are concentrating on deceptive downloads and ransomware as a means of earning/stealing money. The trend …

Android “Police Locker” ransomware set to attack

Android users might soon become victims of “Police Locker” ransomware, if they haven’t already, warns the researcher behind the Malware don’t need …

CryptoDefense developers “forget” decryption key on victims’ computer

A new piece of ransomware is targeting gullible users, but its developers have made a critical mistake that should allow users to decrypt the affected files without paying the …

Don't miss

Cybersecurity news