cyber criminals

Wed
08
Jan
John Lister's picture

New Clop Ransomware Encrypts Windows Processes

Researchers have spotted new ransomware with a nasty new twist. "Clop," as it's called, doesn't just encrypt files, but deliberately attempts to screw up applications as well. The move is most likely intended to reduce the chances of the ransomware ... being blocked, but also means an attack could be even more disruptive and make it more likely a complete rebuild of the affected PC is necessary. Normally ransomware's main task is to encrypt as many files as possible on a computer. The idea here is to extort the user by forcing them to pay a ransom to regain access to the locked files. ... (view more)

Fri
03
Jan
John Lister's picture

North Korea Accused of Attacking Windows Users

Microsoft has warned users to pay particularly close attention to emails that appear to come from "microsoft.com". A simple trick involving spelling was the key to a security attack that Microsoft believes was instigated by North Korea. A US court ... has given Microsoft legal control of 50 web domains it says were used to carry out cyber attacks on Windows users. It's said to be the work of a group dubbed Thallium operating out of North Korea. Microsoft says the attacks were targeted at "government employees, think tanks, university staff members, members of organizations ... (view more)

Thu
12
Dec
John Lister's picture

Critical: Font Bug Affects All Versions of Windows

A bug in the way Windows handles fonts could leave computers open to a "drive-by attack" - as long as the machine is connected to the Internet. It's among the vulnerabilities fixed in the latest Windows security update. All versions of Windows are ... affected . The bug involves the way Windows deals with embedded fonts. An embedded font means that the document includes the code for the font itself. It's generally used where a document or web page designer wants users to see a specific font that's not widely installed on computers. The bug means an embedded font could be coded in a way ... (view more)

Thu
27
Jun
John Lister's picture

Florida Gov't Ransomware Tops $1 Million Payout

Officials in Lake City, Florida have voted to pay half a million dollars to hackers to regain access to computer files. It's the second such payment by a local government in the state in as many weeks. Lake City's government computer system was hit ... by a ransomware attack in which hackers remotely encrypt files and then demand payment to unlock them. They asked for 42 units of the digital cryptocurrency Bitcoin, worth roughly $500,000. That payment method makes it much harder to trace the recipients. The good news in this case is that public safety networks are unaffected and that all ... (view more)

Thu
14
Mar
John Lister's picture

Web Creator Fears Dysfunctional Future

The creator of the World Wide Web (WWW) says it faces a "downward plunge to a dysfunctional future." Sir Tim Berners-Lee said many of its problems were unintended consequences. Berners-Lee spoke to mark the 30th anniversary of him submitting a ... proposal to his managers at European science group CERN for a way to organize data. That technology, based on hyperlinked text, became the World Wide Web. In turn, that helped shape the Internet into something used worldwide by ordinary people. (Source: bbc.co.uk ) Writing an open letter, Berners-Lee noted that the web is now "a public square, a library ... (view more)

Thu
21
Feb
John Lister's picture

Symantec: Popular Microsoft Apps Hijack PCs

At least eight apps in the official Microsoft Store were secretly designed to use a computer's resources without permission. It undermines Microsoft's efforts to promote the store as a "safe source of software." In the past few years, Microsoft has ... heavily pushed the idea of Windows users getting software from an app store - similar to the way mobile devices work - rather than the more traditional method of getting programs from a third-party sources and installing them directly to the PC or smartphone / tablet. There's even a special 'S' mode for Windows 10 that only allows the ... (view more)

Thu
14
Feb
John Lister's picture

Popular VPN App Laced with Malware, Steals Data

Security researchers have warned a notorious piece of malware has returned to Android. It's in disguise, posing as a legitimate and popular VPN application. Researchers at the security firm Bitdefender have dubbed the malware as "Triout," which was ... first spotted last August. It's a particularly nasty piece of malware as it carries out multiple hostile acts. (Source: bitdefender.com ) These include recording phone calls, reading incoming SMS messages, taking pictures and videos, and collecting location data such as GPS coordinates. Triout is designed to operate without being detected ... (view more)

Mon
17
Sep
Dennis Faas's picture

Explained: Is Ransomware a Real Threat? Should I worry?

Infopackets Reader Tina A. writes: " Dear Dennis, I've been reading articles on the Internet about cyber criminals breaking into computer networks, encrypting files and then demanding a ransom. I've also read that if I leave my computer connected to ... the Internet, I could be susceptible to ransomware. I don't know what to believe. So my question is: is ransomware a threat? Is ransomware malware? Should I be worried? " My response: This is a pretty big question to answer. The simple answer is that: yes , ransomware is a threat, and yes you can get infected with ransomware just by having your ... (view more)

Thu
06
Sep
John Lister's picture

New Firefox to Block Unwanted Tracking, Cryptojacking

Firefox is getting a series of updates to boost performance, privacy and usability. Unwanted tracking tools and browser hijackers are among the targets of security updates. Two of the biggest measures deal with websites that track user activity ... online, potentially to make site content more relevant, but more commonly to deliver targeted advertising. Version 63 of Firefox, due in September, will by default block ad trackers if they take a particularly long time to load, in turn making pages slow to appear. This setting is purely to do with the load time of the tracker rather than what it ... (view more)

Mon
20
Aug
Dennis Faas's picture

Samsung: Smartphones Most Secure for Cryptocurrencies

Samsung Provokes Debate with Claims that Smartphones Are The Most Secure for Cryptocurrencies Last month, leading Samsung author Joel Snyder penned a blog post in which he made the bold assertion that smartphones encompass the best security for ... owning, trading and managing cryptocurrency. He put this down to the Trusted Execution Environments (TEEs) in which smartphones, and particularly those developed by Samsung, operate. A trusted execution environment (TEE) is a secure area of a processor found on smartphones (not PCs), originally developed in 2010 by Open Mobile Terminal Platform ... (view more)

Pages

Subscribe to RSS - cyber criminals