Decompiled Source Code for SLocker Android Ransomware is on the Internet

Unpleasant information for Android users – decompiled source code of the old mobile ransomware returns. It was put online and it’s a great opportunity for the attackers to exploit this information for the development of unique and innovative versions of Android ransomware. During the past six months, this code created for the SLocker android ransomware, …

Hazardous Mobile Banking Trojan Gains ‘Keylogger’ to Thieve Everything

Every day cyber criminals improve their skills, as a result, they’re becoming more innovative, proficient and concealed. They have changed their typical techniques to covert ones that are harder to reveal. Security specialists have investigated that one of the most dangerous Android banking Trojan family has now been improved to add a keylogger to its …

Google Reveals Narrow Focus Specialized Spyware “Lipizzan”

Google security specialists state to have revealed a new spyware, which has been created by “cyberweapons” developer for some state detectives. The malware called Lipizzan, contains code, which orients to Israeli start-up Equus Technologies that state on a LinkedIn page to develop unique innovative resolutions for public security authorities, intelligence services, and national security organizations.

The Stages of Security Sorrow

Security specialists try to overcome the typical feelings of rejection, rage, negotiating and accepting. When talking about the enterprise security, hackers have the cards in hands, because they need only one direction for the attack while security professionals must protect against every potential threat. There are a lot of spheres to hit, but enterprise’s security …

Internet of Things Malware Activity Already Doubled 2016 Numbers

New malware types that target connected internet-of-things (IoT) have increased more than two times the last year. Security specialists noted in their report that they observed malware attempts to connect to the open telnet port. During the period of 24 hours criminals made uncountable number of connections from exclusive IP addresses.

New malware – old tricks

Security researchers’ ability to reveal and disorder the high-value command & control (C&C or C2) irritates malware creators to the utmost. Hackers are worried because the majority of modern malware will lose their operability without C&C, i.e. malware becomes uncontrolled like a headless chicken. If such C2 infrastructure could be concealed from view? For example, …

A number of the Fireball or WannaCry attacks increases during May 2017

As Check Point’s latest Global Threat Impact Index informed, three malware families that hit networks greatly were zero-day. As statistics shows, Fireball affected one in five organizations worldwide, in the second-place is RoughTed affecting 16% and in the third place is WannaCry affecting approximately 8% of organizations worldwide.

3 Nigerian Criminals Were Sentenced to 235-Years Imprisonment in U.S.

Have you ever heard about cheerful Nigerian scammers? One of them is Nigerian astronaut who needs $3 million to get back to Earth from the 25 years cosmic trap. Are you ready to help him? Besides, Nigerians are specialists in promising real love and unending happiness. Tens of millions of dollars were spent on such …