Monitoring Employee Activity – where are the limits?

You aren`t satisfied with your job, are you? You use company devices for your own purposes? Did you send your CV and title the message in some unusual way? Oh, honey. As the Guardian reported, the surveillance technology includes tracking what resources do the employees visit and what do they type in their text messages, …

Phishing Malware: Different Location – Different Malware

A new malicious payload distribution has been revealed. This strategy isn`t commonly used by hackers. PhishMe analysis informed that on September 28 intruders claimed to spread a scanned document with a .7z archive, which contains a malicious VBScript application. The purpose of this app is to get and to run the Locky ransomware or the …

backup

Ransomware Aims at Backups: 4 Ways to Prevent the Attack

Backups definitely help you to get control over your defense against ransomware, but they also require appropriate protection. Cybercriminals are again in full play: WannaCry and NotPetya – two disastrous attacks – have caused pecuniary injury; attackers continue to hit systems and sensitive information of the users. Good backups and time-tested recovering process remain to …

Banking Trojans Come out of the Shadow

Cybercriminals intensively used banking trojans during August. Three new variants appear in Check Point`s latest Global Threat Impact Index. The Zeus, Ramnit and Trickbot banking trojans hold the top spots. These viruses work on the following scheme: identification of a victim who is visiting the banking website – usage of keylogging to collect the necessary …

A New Way for Malware to Conceal

Finally, researchers have revealed a 17-year-old software error in Microsoft`s Windows kernel, which could cause serious problems in the security shpere, such as pure, even no detection of malware during downloading execution into the system memory. Omri Misgav, enSilo security researcher, informed that problem lies in the kernel routine “PsSetLoadImageNotifyRoutine” that influences all versions of …

One More Malware Penetration in Google`s Play Store

Security specialists from Check Point called this malware ExpensiveWall, because it affected Wallpaper app. It contains a payload, by which users are registered to pay for online services. Besides, this payload sends SMS messages, using a telephone of the user and makes him to settle a bill. This malware was discovered in 50 apps on …

Decompiled Source Code for SLocker Android Ransomware is on the Internet

Unpleasant information for Android users – decompiled source code of the old mobile ransomware returns. It was put online and it’s a great opportunity for the attackers to exploit this information for the development of unique and innovative versions of Android ransomware. During the past six months, this code created for the SLocker android ransomware, …

Hazardous Mobile Banking Trojan Gains ‘Keylogger’ to Thieve Everything

Every day cyber criminals improve their skills, as a result, they’re becoming more innovative, proficient and concealed. They have changed their typical techniques to covert ones that are harder to reveal. Security specialists have investigated that one of the most dangerous Android banking Trojan family has now been improved to add a keylogger to its …