Archive for the ‘Cyber Security News’ Category

Flaw in GozNym Banking Trojan Meets Its Match

Thursday, September 29th, 2016

Cisco Researchers Find a Flaw in the Banking Trojan's Domain Generation Algorithm The GozNym banking Trojan used to be one of the most formidable threats out there. It is estimated that it has infected tens of thousands of computers and that it has led to the theft of thousands of ...

Confucius Asks Yahoo Answers and Quora for Directions to Its C&C Server

Thursday, September 29th, 2016

Before carrying out the task they're designed for, most malware families need to establish a connection with their Command & Control servers (C&Cs). Lower quality strains have a hard-coded list of IPs which they use to find a working C&C, and the more sophisticated threats use Domain Name Generation ...

Unlock92 Ransomware Proves to be Surprisingly Resilient

Wednesday, September 28th, 2016

There are two types of ransomware, families like Locky and Cerber are incredibly sophisticated and torment users for months or even years on end. Strains like Philadelphia and Apocalypse, on the other hand, are easy to crack and are usually gone after a couple of weeks. The lower quality ...

Potty-Mouthed Hackers Name Their Ransomware After Fabian Wosar

Saturday, September 10th, 2016

Wosar Responds by Cracking the Ransomware The modern-day infosec industry can be described as a cat and mouse game between security specialists and cyber criminals. The crooks do everything they can to stay a step ahead while experts like Fabian Wosar from Emsisoft are on a never-ending quest to stop ...

Updated GovRAT Malware Targets U.S. Agencies

Saturday, September 10th, 2016

Dangerous, high-profile malware gets new version Security experts with InfoArmor informed that a new iteration of a dangerous malware threat that targets government agencies has been released. The malware is called GovRAT and is far from your garden variety threat. InfoArmor published a report on the older version of GovRAT ...

Hackers Utilizing Rogue USB Devices to Steal Credentials from Locked Windows Computers

Thursday, September 8th, 2016

As sure as the earth continues to rotate on its axis, hackers are sure to find new ways to exploit the vulnerabilities within computers. This time, Rob Fuller, a principal security engineer at R5 Industries, discovered that attacks could copy a Windows password hash from a locked PC from ...

Mobile Malware Doubles in 2016

Thursday, September 8th, 2016

The number of smartphones that are infected with some sort of malware has risen dramatically over the first half of this year, a new report indicates. The data is collected and published by the Nokia Threat Intelligence Lab and covers statistics collected from the territory of Europe, North America, ...