Quantcast
Channel: Information Security News|Cyber Security|Hacking Tutorial
Browsing all 1097 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

How hackers used this Trojan malware to spy on a territorial dispute

F-Secure researchers say parties involved in the South China Sea arbitration case were infected with the data-stealing NanHaiShu Trojan. Hackers have used targeted malware to steal data from some of...

View Article


Image may be NSFW.
Clik here to view.

Kazakhstan Government Uses Malware to Spy on Journalists and Political Activists

EFF exposes threat group operating for Kazakhstan regime. The Electronic Frontier Foundation (EFF) has released a report today named Operation Manul that details attacks with malware on Kazakhstan’s...

View Article


Image may be NSFW.
Clik here to view.

Backdoor.Remvio: Highly customizable remote access Trojan sold online

The new Trojan can be used to steal information and passwords from compromised computers. Symantec recently noticed that an Italian malware author called z3r0 is selling a new remote access Trojan in...

View Article

Image may be NSFW.
Clik here to view.

Hackers Make the First-Ever Ransomware for Smart Thermostats

One day, your thermostat will get hacked by some cybercriminal hundreds of milesaway who will lock it with malware and demand a ransom to get it back to normal, leaving you literally in the cold until...

View Article

Image may be NSFW.
Clik here to view.

How Robot Malware Brains Work

Advances in software application development designed to protect us against malware evolve positively forward every day, yet the threat of cybercrime continues. But if we understand how ‘malware...

View Article


Image may be NSFW.
Clik here to view.

Development version of the Hitler-Ransomware Discovered

It looks like file deletion is becoming a standard tactic in new ransomware applications created by less skilled ransomware developers. This is shown in a new ransomware called  Hitler-Ransomware, or...

View Article

Image may be NSFW.
Clik here to view.

Oracle-owned point-of-sale service suffers from malware attack

A Russian organized cybercrime group known for hacking into banks and retailers appears to have breached hundreds of computer systems at software giant Oracle Corp., KrebsOnSecurity has learned. More...

View Article

Image may be NSFW.
Clik here to view.

Researchers crack open unusually advanced malware that hid for 5 years

Espionage platform with more than 50 modules was almost certainly state sponsored. Security experts have discovered a malware platform that’s so advanced in its design and execution that it could...

View Article


Image may be NSFW.
Clik here to view.

Nemucod is back and serving an ad-clicking backdoor instead of ransomware

The trojan downloader Nemucod is back with a new campaign. This time however, it has changed the payload served to its victims – ransomware is not its go-to malware. Currently the “weapon of choice” is...

View Article


Image may be NSFW.
Clik here to view.

Automated systems crawl the DarkWeb to find Zero-Days

A team researchers at Arizona State University (ASU) is crawling the Darkweb searching for zero-days for Proactive Cybersecurity Threat Intelligence.Can finding zero-day vulnerabilities be as easy as...

View Article

Image may be NSFW.
Clik here to view.

Researchers Hide Malware Inside Digitally-Signed Files Without Breaking Hashes

New technique makes malware detection almost impossible. A team of security researchers from Deep Instinct have discovered a method of injecting malware inside a digitally-signed binary without...

View Article

Image may be NSFW.
Clik here to view.

Bungling Microsoft singlehandedly proves that golden backdoor keys are a...

Redmond races to revoke Secure Boot debug policy. Microsoft leaked the golden keys that unlock Windows-powered tablets, phones and other devices sealed by Secure Boot – and is now scrambling to undo...

View Article

Image may be NSFW.
Clik here to view.

Linux bug leaves USA Today, other top sites vulnerable to serious hijacking...

“Off-path” attack means hackers can be anywhere with no man-in-the-middle needed. Computer scientists have discovered a serious Internet vulnerability that allows attackers to terminate connections...

View Article


Image may be NSFW.
Clik here to view.

CryptFile2 Ransomware Returns in High Volume URL Campaigns

Proofpoint researchers originally discovered the CryptFIle2 ransomware in March [1]. At the time, it was spreading via exploit kits (EKs); however, beginning on August 3, 2016, we detected the first...

View Article

Image may be NSFW.
Clik here to view.

An ATM hack and a PIN-pad hack show chip cards aren’t impervious to fraud

The good news? Hacks are limited for now. The bad news? Hackers will get better. Security researchers are eager to poke holes in the chip-embedded credit and debit cards that have arrived in Americans’...

View Article


Image may be NSFW.
Clik here to view.

New air-gap jumper covertly transmits data in hard-drive sounds

“DiskFiltration” siphons data even when computers are disconnected from the Internet. Researchers have devised a new way to siphon data out of an infected computer even when it has been physically...

View Article

Image may be NSFW.
Clik here to view.

New Information Stealing Trojan Steals and Uploads Corporate Files

Corporate cybercrime and information theft has become a very lucrative business for malware developers. Not only does it allow them to steal corporate secrets to sell to the highest bidder, but it can...

View Article


Image may be NSFW.
Clik here to view.

New Scylex Banking Trojan Kit Surfaces on the Dark Web

Scylex – “the next big thing” in terms of banking trojan. Threat-intel experts from Heimdal Security and the CSIS Security Group have uncovered a new banking trojan called Scylex, currently advertised...

View Article

Image may be NSFW.
Clik here to view.

Road Warriors: Beware of ‘Video Jacking’

A little-known feature of many modern smartphones is their ability to duplicate video on the device’s screen so that it also shows up on a much larger display — like a TV. However, new research shows...

View Article

Image may be NSFW.
Clik here to view.

PokemonGo Ransomware installs Backdoor Account and Spreads to other Drives

With the popularity of PokemonGo, it was inevitable that a malware developer would create a ransomware that impersonates it.  This is the case with a new Hidden-Tear ransomware discovered by Michael...

View Article
Browsing all 1097 articles
Browse latest View live