News Clipping


Why ransomware? Let’s ask the bad guys [source: helpnetsecurity]

To be honest, this is not something that should come as a surprise. Many are involved with cybercrime because they feel that they are safe from arrest. It is also one of the few crimes that offer a helpdesk! Indeed within the majority of ransomware demands victims are given the option of...

Read more


A bad wi-fi router flaw led to a responsible disclosure[source: cyberscoop]

Tens of thousands of long-range WiFi routers used to provide home wireless broadband, especially in remote or rural areas, are riddled with vulnerabilities that could let a hacker take over IT networks, security researchers said Tuesday. The vulnerabilities, some of which can be exploited remotely if the router’s management interface...

Read more


Microsoft Office Docs New Vessel for Loki Malware [source: darkreading]

Loki malware, built to steal credentials, is distributed via Microsoft Excel and other Office applications rigged with malicious ‘scriptlets’ to evade detection. A stealthy new attack distributes Loki malware in Microsoft Excel spreadsheets and other Office applications. The attack, which was discovered by Lastline Labs, is tough to detect in...

Read more


Buyers Beware of Tampered Gift Cards [source: krebsonsecurity]

Prepaid gift cards make popular presents and no-brainer stocking stuffers, but before you purchase one be on the lookout for signs that someone may have tampered with it. A perennial scam that picks up around the holidays involves thieves who pull back and then replace the decals that obscure the...

Read more


Exploited to Deliver a Cracked Version of the Loki Infostealer[source: trendmicro]

The Cobalt hacking group was one of the first to promptly and actively exploit CVE-2017-11882(patched last November) in their cybercriminal campaigns. We uncovered several others following suit in early December, delivering a plethora of threats that included Pony/FAREIT, FormBook, ZBOT, and Ursnif. Another stood out to us: a recent campaign that used the same vulnerability to install a...

Read more


Page 30 of 53« First...1020...2829303132...4050...Last »