What to Do After a Cyberattack: 4 steps to Recovery

If you have ever dealt with consequences of a cyberattack, you’ll agree that two key tips on quickly recovering after it sound as “act fast” and “be prepared”. Nowadays, more and more businesses become victims of cyberattacks, because a great variety of malicious software and new social engineering techniques aimed at compromising personal info and …

What’s the Difference Between Adware and Ad Fraud?

Both adware and Ad Fraud deal with the advertising, but they are designed for different purposes and their operation also differs. They are practically two of a kind and none of them care about the way of making money. Nevertheless, there are profound difference in their functioning. Let’s look more closely at both of them. …

How to make PC security alerts better? Make them twirl, jiggle

You are not only one person who at least once in a lifetime neglected of security alert message on your computer. Such admonitions invented against malware infections and hacks on computer networks. Unfortunately, we often ignore them because of our business or because we see them very often and just don’t mind even if these …

A method of stealing data from offline PCs discovered

The researchers managed to decipher PC’s data by studying its electro-magnetic emanation. Israeli security researchers have discovered a method of hacking computers, which are not connected to the Internet. These experts managed to steal crypto keys by means of measuring electro-magnetic emanation during the data decoding. They used the attack method known as “side channel …

Comodo Antivirus allows remote access to the PC

Comodo Internet Security installs and launches a VNC server by default. Tavis Ormandy, a security researcher from Google Project Zero, has discovered yet another problem with a software product from Colomo. This time software at issue is Comodo Internet Security, which installs and launches a VNC server, allowing remote access to the PC, by default. …

The coders’ algorithm of hydracrypt and umbrecrypt cracked

The security researcher from Emsisoft Fabian Wosar managed to crack the encryption algorithms of numerous ransomware thus making many hackers angry. Nevertheless, Wosar is not going to stop, but on the contrary – recently, he has managed to decipher the ransomware families HydraCrypt and UmbreCrypt and has released a new decrypter. HydraCrypt and UmbreCrypt are …

Android malware steals voice two factor authentication

Experts from Symantec have recently reported about discovery of a new version of the banking Trojan called Android.Banksy, which steals Android users’ financial information. The difference between this Trojan and other malware of this kind is in that Android.Banksy is capable of intercepting two-factor authentication codes transmitted by voice calls. Malware is constantly evolving, and …

BlackEnergy Trojan gets into the system through a vulnerability in Microsoft Office 2013

Information security experts from SentinelOne exposed a new tactic of spreading BlackEnergy malware, which has been attacking SCADA-system throughout Europe. It turns out that the latest version of this software is distributed together with Microsoft Office, and targets inattentive and careless employees of energy companies, who unintentionally bring malware to the system. A team of …

eBay Administration is not going to fix a dangerous bug

Researchers from Check Point recently discovered a serious vulnerability in the eBay online platform. The technique used by the bug got the name JSF ** k. It allows attackers to circumvent eBay filters. It means that an attacker can open his or her own shop on eBay, add malicious JavaScript into the item description, and …

Linux Trojan spyware has a Windows version

Experts from Kaspersky Lab reported about discovery of “twin brother” of Linux.Ekocms trojan, the malware that had previously been found by “Doctor Web”. According to a new report, this malware now has a Windows version. Generally, the Windows version of this Trojan works similarly to its Linux counterpart. Of course, there are certain differences in …