macro virus

Fileless Malware Spread via Word Documents And Windows PowerShell

A while ago, security experts found out a new kink in the tactics of cyber criminals. In order to deliver fileless malware to their targets, hackers are now combining spam campaigns,...
web browser

Most Secure Web Browsers for 2016

Secure mainstream browsers are difficult to find, as seen in recent years with the increased complexity of malware and the inherent design flaws that need patching after release. A hardened or...
ottawa hospital

Ottawa Hospital Under Ransomware Attack

This week, Ottawa Hospital reported that its computer network was infected with ransomware. Four of the hospital's 9,800 virtual machines were affected.According to the CBC News, the computers were struck by...
money stealing trojan

Adult Websites Spread Android Banking Trojan

The so called Android Marcher Trojan has been using pornographic websites to make users download a malicious file, disguised as an application on the Google Play store, which steals their financial...
bitcoin

Malicious Chrome Extension Steals Users’ Bitcoins

Bitstamp, the Slovenian Bitcoin exchange portal, is warning Google Chrome users that an extension is stealing their Bitcoin when making a transfer.This is a Chrome extension, called "BitcoinWisdom Ads Remover", which...
ransomware share

Top 3 Ransomware Families: CryptoWall, Locky and TeslaCrypt

A US cyber-security firm Fortinet reported that today's top ransomware families are CryptoWall, Locky, and TeslaCrypt.The security company collected the data using its Intrusion Prevention System (IPS) system. The experts logged...
sms exploit

Exploit for Mobile Modems can Compromise SMS and HTTP

The security tester Timur Yunusov has found critical vulnerabilities in routers and 3G and 4G modems from Gemtek, ZTE, Huawei and Quanta. Due to these flaws, cyber criminals could fully compromise...
Tor browser

New Techniques For Fingerprinting Tor Browser Users

Usually, PC users who want to remain anonymous online use Tor Browser. However, despite the fact that this browser hides users' IP addresses, cyber criminals have found some methods to identify...
malware attacks au banks

Four Australian Banks’ Two-factor SMS Codes Stolen by Malware

Australian largest banks are the main target of an Android attack which steals banking details and thwarts two-factor authentication security.The customers of National Australia Bank, ANZ Bank, Commonwealth Bank and Westpac...
burrp.com hacked

Burrp.com Compromised, Serves Teslacrypt Ransomware

It is a common fact that hackers often use exploit kits to locate vulnerabilities in the systems and infect users with malware.What an exploit kit does is to open a medium...