Ransomware As A Tool – LockerGoga

Credit to Author: Ghanshyam More| Date: Wed, 03 Jul 2019 07:18:00 +0000

Ransomware authors keep experimenting with the development of payload in various dimensions. In the timeline of ransomware implementations, we have seen its evolution from a simple screen locker to multi-component model for file encryption, from novice approach to a sophisticated one. The Ransomware as a Tool has evolved in wild…

Read more

Beware! Email attachments can make you victim of spear phishing attacks

Credit to Author: Prashant Tilekar| Date: Fri, 21 Jun 2019 09:15:28 +0000

In the last few months, we’ve seen a sudden increase in Spear Phishing attacks. Spear phishing is a variation of a phishing scam wherein hackers send a targeted email to an individual which appears to be from a trusted source. In this type of attack, the attacker uses social engineering tricks and some…

Read more

The Silence hacking crew grows louder

Credit to Author: Danny Bradbury| Date: Thu, 22 Aug 2019 10:32:26 +0000

The hacking group, which specialises in stealing from banks, has been spreading its coverage and becoming more sophisticated.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/harEaJXHeBo” height=”1″ width=”1″ alt=””/>

Read more

Ransomware disrupts 22 Texas government departments

Credit to Author: John E Dunn| Date: Wed, 21 Aug 2019 11:44:59 +0000

On August 16, Texas local government became the latest victim of the expanding global racket that is ransomware.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/sXMvstdTRNU” height=”1″ width=”1″ alt=””/>

Read more

iPhone holes and Android malware – how to keep your phone safe

Credit to Author: Paul Ducklin| Date: Fri, 16 Aug 2019 14:13:44 +0000

Watch the latest Naked Security Live video for our non-technical tips to improve your online safety, whichever type of phone you prefer.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/wlXfZPzm5No” height=”1″ width=”1″ alt=””/>

Read more

Hacked devices can be turned into acoustic weapons

Credit to Author: Lisa Vaas| Date: Tue, 13 Aug 2019 13:54:10 +0000

Security researcher Matt Wixey found that many gadgets aren’t protected from being turned into hearing-damaging weapons. Or melting.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/S9CML6xBVTQ” height=”1″ width=”1″ alt=””/>

Read more

More than 2m AT&T phones illegally unlocked by bribed insiders

Credit to Author: Lisa Vaas| Date: Thu, 08 Aug 2019 12:28:54 +0000

The alleged, now indicted ringleader paid more than $1m in bribes to insiders who planted malware and hardware for remote unlocking.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/5KmgBCGFT2U” height=”1″ width=”1″ alt=””/>

Read more

Don’t let the crooks ‘borrow’ your home router as a hacking server

Credit to Author: Paul Ducklin| Date: Wed, 07 Aug 2019 14:18:42 +0000

Crooks don’t have to break *into* your network to benefit – they can bounce *off* it so you take the blame and look like a hacker yourself.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/5y3xxyh3DoA” height=”1″ width=”1″ alt=””/>

Read more