Monday, December 10, 2018
Computer Security News

Computer Security News

Koolova Ransomware Unlocks Your Files if You Read Two Ransomware Avoidance Posts

A newly-found piece of ransomware, dubbed Koolova, requires victims to read two blog posts about ransomware avoidance in exchange for decrypting their files. The ransomware threat keeps on growing with new and...
Anti-Forensics-Tool

WikiLeaks Exposes CIA’s Anti-Forensics Tool

The third set of stolen CIA documents has recently been released. After Year Zero and Dark Matter, WikiLeaks has now opened another vault. Codenamed Marble, the vault contains 676 source code...
SyncCrypt-Ransomware-Images

Image Files Hide SyncCrypt Ransomware Components

SyncCrypt is a brand new strain of ransomware which hides its components inside image files. Similarly to other malware infections, the SyncCrypt ransomware is distributed through spam emails alongside attachments which contain...
remaiten malware

Remaiten Malware Targets Linux-Based Routers

Security experts reported that a brand new malware is targeting embedded systems in order to compromise and make them part of a botnet. The newly-found threat is called “Remaiten” (Linux/ Remaiten) and...
malware cocktail

Malware Cocktail Used in Email Phishing Scams

Nowadays, Crypto ransomware is considered as one of the biggest threats to enterprises, especially when it comes to phishing email scams. Not long ago, FBI released an advisory to businesses and...

Facebook Parse Used For C&C Server by Two Mobile Banking Trojans

Two banking trojans are said to target mobile devices lately. The Android/OpFake and the Android/Marry malware families have stored their C&C servers inside Facebook Parse, the company's BaaS offering. BaaS is a...
spam

Ransomware Delivered by Spear Phishing Spam Campains

These days, the art of sending personalized e-mails designed to trick users into divulging login credentials or clicking on malicious links (also known as “spear phishing”), has been limited to espionage...
komplex trojan

The Komplex Trojan Infects OS X Systems With Decoy Docs

Palo Alto Networks researchers have detected an OS X Trojan, which, according to them, has been previously used by an infamous Russian cyber spying gang in attacks against the aerospace industry. Dubbed...
google-drive-logo

Google Drive Backing Up The Entire Computer Soon

Google Drive will soon be converted into a backup tool with a brand new feature. Instead of storing files inside the Drive folder, Google will start monitoring and backing up files...
Google-store-apps

Google Stands Against the Android Crashing Applications

Google is focusing on the application quality at the Play Store in order to help users find the apps which won't affect their devices. According to the latest announcement by Google, the...