HackDig : Dig high-quality web security articles for hacker

SamSam ransomware attacks increase and crooks demand higher ransom

Researchers at AlienVault observed a significant increase in the number of SamSam ransomware attacks, crooks are demanding $33,000 to the victims. Security experts at AlienVault have observed a new string of attacks leveraging the SamSam ransomware, and this time crooks are demanding a $33,000 ransom to decrypt the files. According to the researchers, crooks
Publish At:2017-06-25 14:20 | Read:150 | Comments:0 | Tags:Breaking News Malware Cybercrime malware Samsam ransomware

Attackers can exploit electronic cigarettes to hack computers

Hackers can exploit electronic cigarettes and any other electronic device to deliver a malware in a poorly protected network. In November 2014, in a discussion started on the Reddit news media website it has been debated the case of a malware implanted by using electronic cigarettes connected over USB. Hackers are able to exploit any electronic device to del
Publish At:2017-06-22 12:40 | Read:128 | Comments:0 | Tags:Breaking News Hacking charger electronic cigarettes malware

Honda halted production in a factory after finding WannaCry traces in its networks

The Honda company shuts down a factory in Japan after finding the WannaCry ransomware in its networks after 5 weeks its massive attack. The WannaCry ransomware makes the headlines once again, The Honda Company to stopped the production in one of its plant in Japan after discovering the malware in its computer networks, The Honda automaker halted the activiti
Publish At:2017-06-22 12:40 | Read:128 | Comments:0 | Tags:Breaking News Cyber Crime Malware

Disposable Computing is the Essence of Bromium’s Micro-Virtualization

We live in a disposable society, from our ever-present convenience foods in throw-away packaging to online speed-dating tailor-made for today’s low attention-span, instant gratification, swipe-left culture. Why be stuck with the same cruddy old PC filled up with accumulated digital gunk day after day, when you can have a squeaky-clean brand new computer eac
Publish At:2017-06-21 23:00 | Read:153 | Comments:0 | Tags:Innovation computing disposable endpoints innovators kill-ch

Cisco Talos releases the BASS open source malware signature generator

Cisco Talos intelligence group released an open source framework named BASS that is designed for automatically generating antivirus signatures from malware. BASS is an automated signature synthesizer, it is able to automatically create signatures from the analysis of a malicious code that belongs to previously generated clusters. The BASS tool aims to simpli
Publish At:2017-06-21 18:15 | Read:198 | Comments:0 | Tags:Breaking News Malware BASS Cisco Talos ClamAV forensics malw

South Korean hosting provider NAYANA infected by Erebus ransomware, it paid $1 Million to crooks

South Korean web hosting company NAYANA was hit by the Erebus ransomware that infected 153 Linux servers and over 3,400 business websites the company hosts. The South Korean web hosting provider NAYANA has paid $1 million in bitcoins to crooks after a Linux ransomware infected its systems. its 153 servers, encrypting 3,400 business websites and their data,
Publish At:2017-06-21 18:15 | Read:203 | Comments:0 | Tags:Breaking News Cyber Crime Malware Cybercrime Erebus ransomwa

More Mobile Apps Means More Man-in-the-Middle Attacks

When you travel outside your corporate network with your mobile device, you are much more vulnerable to man-in-the-middle (MitM) attacks. This is how attackers intercept data as it’s being passed from a mobile device to a server. Of course, this is problematic for a number of reasons. CSO Online demonstrated how easy it is to steal all sorts of informa
Publish At:2017-06-21 17:10 | Read:221 | Comments:0 | Tags:Endpoint Mobile Security Application Security Bring-Your-Own

Disposable Computing is the Answer to Cyber Security for Business

Disposability has become a regular thing in our lives; but you may have taken for granted the value it brings. Cost, convenience and risk are the cornerstones of successful disposability. Disposable computing offers a solution to cyber security and provides you with valuable threat information. This is the first in our two-part series on disposable computi
Publish At:2017-06-21 04:35 | Read:198 | Comments:0 | Tags:Innovation computing convenience cost disposable end users I

TrickBot gang is back with new campaigns targeting Payment Processors and CRM Providers

Threat actors behind the financial trojan TrickBot have been updating its campaigns targeting Payment Processors and CRM Providers. Threat actors behind Banking Trojan TrickBot switched from financial institutions to Payment processors and CRM providers. TrickBot was initially observed in September 2016 by the researchers at security firm Fidelis Cybersecuri
Publish At:2017-06-20 23:50 | Read:124 | Comments:0 | Tags:Breaking News Cyber Crime Malware banking trojan botnet CRM

Two Ztorg Trojans Removed from Google Play Store Are Definitely Better

For the second time in a month, Google removed malicious apps infected with the Ztorg Trojans that could allow attackers to root targeted devices. Most software developers update their apps to patch vulnerabilities and add new features. But when the software is malware, an update could be the worst thing to do. The Google Play Store is always working to prev
Publish At:2017-06-20 23:50 | Read:178 | Comments:0 | Tags:Breaking News Cyber Crime Hacking Malware Mobile Android Cyb

TrickBot Spreads to the Nordics, Launches Redirection Attacks in France

IBM X-Force Research detected a new wave of TrickBot attacks targeting banks in Nordic countries. The malware expanded its configurations to launch fraud attacks against banks in Sweden, Finland, Norway, Denmark and Iceland, among the other geographies it targets. Moreover, the malware, which has been testing redirection attacks on one bank in France, now ta
Publish At:2017-06-20 22:45 | Read:91 | Comments:0 | Tags:Banking & Financial Services Fraud Protection Malware Threat

Mexican Government was spying on Journalists and Activists with Pegasus Surveillance software

Journalists and activists in Mexico accused the government of spying on them with the powerful surveillance software Pegasus developed by the NSO Group. Journalists and activists in Mexico accused the government of spying on them with a powerful surveillance software. According to the journalists, the authorities used an Israeli spyware to hack their mobile
Publish At:2017-06-20 05:25 | Read:157 | Comments:0 | Tags:Breaking News Digital ID Hacking Hacktivism Malware Mobile M

Rufus malware used to empty ATMs running outdated OS in India

Indian authorities are facing with the Rufus malware, a malicious code used to clean out ATMs running outdated Windows XP software across states. Many security firms and law enforcement agencies are warning of malware-based attacks against ATM. Recently 27 people have been arrested by the Europol for jackpotting attacks on ATM across many countries in Europe
Publish At:2017-06-19 11:00 | Read:153 | Comments:0 | Tags:Breaking News Cyber Crime Malware

Pinkslipbot banking Trojan exploiting infected machines as control servers

Pinkslipbot banking Trojan is a banking Trojan that uses a complicated multistage proxy for HTTPS-based control server communication. Security researchers at McAfee Labs have spotted a new strain of the Pinkslipbot banking malware (also known as QakBot/QBot) that leverages UPnP to open ports, allowing incoming connections from anyone on the Internet to commu
Publish At:2017-06-19 11:00 | Read:199 | Comments:0 | Tags:Breaking News Cyber Crime Malware Banking Malware botnet Cyb

Kasperagent malware used in a new campaign leveraging Palestine-Themed decoy files

Researchers uncovered a new cyber espionage campaign involving the Kasperagent spyware delivered with Palestine-Themed decoy files. In March, experts at security firm Qihoo 360 have spotted a cyber espionage campaign conducted by a threat actor tracked as APT-C-23 and Two-Tailed Scorpion. A few weeks later, in April, researchers at Palo Alto Networks and Cle
Publish At:2017-06-18 16:35 | Read:200 | Comments:0 | Tags:APT Breaking News Cyber warfare Hacking APT-C-23 Kasperagent


Share high-quality web security related articles with you:)


Tag Cloud