R980 Ransomware Uses Disposable Email Addresses to Interact with Victims

R980 Ransomware Uses Disposable Email Addresses to Interact with Victims

There's the danger of losing the decrypter after making payments, since Mailinator regularly deletes inbox emails

Smrss32 Ransomware Targets a Whopping 6,674 File Extensions

Smrss32 Ransomware Targets a Whopping 6,674 File Extensions

New Smrss32 ransomware can't decide what files to lock, so it targets everything it can get its hands on

Locky Ransomware Uses Vulnerable PHP Forms for Spam Distribution

Locky Ransomware Uses Vulnerable PHP Forms for Spam Distribution

Updating the vulnerable PHP scripts solves the problem

Shade Ransomware Adds RAT Features to Spy on High-Value Victims

Shade Ransomware Adds RAT Features to Spy on High-Value Victims

Crooks use RAT to assess the financial status of infected victims and decide on how much money to ask for

This Windows Activation Scam Talks to You So You Won't Forget to Call & Pay

This Windows Activation Scam Talks to You So You Won't Forget to Call & Pay

New Windows Activation Screen scam discovered

Ransomware Spam Flood Targeted US Govt. Agencies, Educational Institutions

Ransomware Spam Flood Targeted US Govt. Agencies, Educational Institutions

Crooks delivered hundreds of thousands of spam emails

ElGato Ransomware Targets Androids, Locks SD Card Data and Steals SMS Messages

ElGato Ransomware Targets Androids, Locks SD Card Data and Steals SMS Messages

Ransomware is still under development, no real threat

Hitler Ransomware Infects Everyone, Not Just the Jews

Hitler Ransomware Infects Everyone, Not Just the Jews

Ransomware is buggy, deletes some user files

How Ironic: FireEye to Cut Staff Because Ransomware Is Hurting Its Business

How Ironic: FireEye to Cut Staff Because Ransomware Is Hurting Its Business

Ransomware is not as profitable as cyber-espionage

Researchers Infect IoT Thermostat with Ransomware

Researchers Infect IoT Thermostat with Ransomware

It was only a proof of concept, no real danger yet

Security Researcher Tricks Tech Support Scammer Into Installing Locky Ransomware

Security Researcher Tricks Tech Support Scammer Into Installing Locky Ransomware

Infosec researcher has fun at a crook's expense

Cerber Ransomware v2 Spotted Online, Is Now Undecryptable

Cerber Ransomware v2 Spotted Online, Is Now Undecryptable

The most active ransomware in the world receives an update

Ransomware Mimics Windows Activation Screen, Uses Poisoned Search Results

Ransomware Mimics Windows Activation Screen, Uses Poisoned Search Results

Unlock code discovered, users can bypass the scam

Google SEO Trick Leads Users to Online Scam, CryptMIC Ransomware

Google SEO Trick Leads Users to Online Scam, CryptMIC Ransomware

Crooks abuse Google's featured snippets listings

Major Cyber-Crime Campaign Switches from CryptXXX to Locky Ransomware

Major Cyber-Crime Campaign Switches from CryptXXX to Locky Ransomware

Gang also migrates from Angler EK to Neutrino EK

Crook Leaks Decryption Keys for Rival Chimera Ransomware

Crook Leaks Decryption Keys for Rival Chimera Ransomware

Rivalry between crooks benefits innocent users, for once

New Locky Spam Wave Delivers Entire Ransomware Inside JavaScript File

New Locky Spam Wave Delivers Entire Ransomware Inside JavaScript File

Locky ransomware continues to evolve, gets closer to 100% JS

 
Want more? Browse: