BandarChor Ransomware Infections Increase

BandarChor Ransomware Infections Increase

Threat is atypical, victims asked to send email to crooks

TrueCrypt Audit Part Two Is on Its Way

TrueCrypt Audit Part Two Is on Its Way

Researchers used their spare time to work on the project

French Businesses Under Ransomware Fire

French Businesses Under Ransomware Fire

Large bill for electronic products is used as a lure

TorrentLocker Operators Make $224,000 in About a Month

TorrentLocker Operators Make $224,000 in About a Month

Most of the money comes from victims in Australia

CryptoLocker Variant Has Been Created Specifically to Target Japanese Users

CryptoLocker Variant Has Been Created Specifically to Target Japanese Users

Compromised websites is the main distribution method

2015 Could Be the Year of the Ransomware

2015 Could Be the Year of the Ransomware

Small and mid-sized businesses may be hit more often

TextSecure Is a Safe Chat Client, Researchers Find

TextSecure Is a Safe Chat Client, Researchers Find

Eliminating the risk of unknown key-share attack is possible

Adobe Digital Editions Now Encrypts Data Collected from Users

Adobe Digital Editions Now Encrypts Data Collected from Users

Sending information about user activity is never a good idea

CryptoWall 2.0 Rampage: 84 New Variants Spotted in Less than a Month

CryptoWall 2.0 Rampage: 84 New Variants Spotted in Less than a Month

New version seems to be popular among cybercriminals

TorrentLocker Ransomware Reaches Italy and Brazil, Affects Thousands

TorrentLocker Ransomware Reaches Italy and Brazil, Affects Thousands

Ransom asked to be paid in digital currency Bitcoin

Android Malware Can Be Delivered Stealthily as an Image or a PDF File

Android Malware Can Be Delivered Stealthily as an Image or a PDF File

Researchers create technique that allows control over the input and the output of AES CBC encryption process

Crypto-Malware Steals Email Addresses and Passwords, Spreads Itself

Crypto-Malware Steals Email Addresses and Passwords, Spreads Itself

Malicious tool relies on free software to carry out nefarious tasks

Yahoo Ad Network Used to Spread CryptoWall Ransomware

Yahoo Ad Network Used to Spread CryptoWall Ransomware

Major ad networks are targeted by cybercriminals all the time

Blackphone Vulnerability Soon to Receive Full Fix

Blackphone Vulnerability Soon to Receive Full Fix

Developer collaborating with the hacker to release a patch

Simple Ransomware Relies on GnuPG for Encryption

Simple Ransomware Relies on GnuPG for Encryption

Main module is a batch file that executes the commands

Tutanota Spy-Proof Email Service Patched Against XSS Risk

Tutanota Spy-Proof Email Service Patched Against XSS Risk

Developers announce improved security for the future release

Cryptocat Developer to Deliver Simple Tool for Complex Encryption

Cryptocat Developer to Deliver Simple Tool for Complex Encryption

Browser extension eliminates private key management

 
Want more? Browse: