New Variant of iSpy Keylogger Distributed Via Spam Email

Security researchers at zScaler have come across a new variant of a commercial keylogger called iSpy. This new variance not only captures victim’s keystrokes, but it can also take screenshots, access their webcam, and steal user data and license keys to popular applications. We call it a commercial keylogger because it actually has a subscription [...]

By |2016-10-16T15:53:41-05:00September 22nd, 2016|Categories: Malware, Security|Tags: , , , , |0 Comments

Misspelled Malwarebytes (Malwerbyte) is Ransomware

You've probably heard of the popular anti-malware program called Malwarebytes. Recently, there's been a misspelled version of the app going around called Malwerbyte, which has ransomware hidden in it. The ransomware it contains is called DetoxCrypto, and there's already a second variant dubbed Calipso. The two variants of ransomware were first discovered back in August. [...]

By |2016-10-16T15:53:45-05:00September 19th, 2016|Categories: Ransomware, Security|Tags: , , , , , |0 Comments

Security Settings To Check In iOS 10

As many of us begin to upgrade to iOS 10 that was launched earlier today, we recommend that you check some of these settings to ensure your security and privacy is still in tact. iOS 10 changed some default settings which should be changed back to the defaults from iOS 9. iOS 10 also brings [...]

By |2017-01-16T15:42:37-05:00September 13th, 2016|Categories: Mobile, Security, Server Hardening|Tags: , , , , , , |0 Comments

Modified USB Ethernet Adapter Can Steal Windows and Mac Credentials

A security researcher by the name of Rob Fuller has posted an article on Softpedia where he has discovered a unique attack method that can steal PC credentials from Windows and Mac computers, and possibly Linux (currently untested). He used USB ethernet adapters where he modified the firmware code so that it runs special software [...]

By |2016-10-16T15:53:58-05:00September 7th, 2016|Categories: Attacks, Security|Tags: , , , |0 Comments

Android Security Basics

Everyone carries around their smartphones these days, and most don't realize the amount of personal data that could be found on them if they ever made it into the wrong hands or got hacked. Securing your smartphone is just as important as securing your personal computer. Today, we'll cover some basics for securing your Android [...]

By |2017-01-16T15:43:00-05:00September 6th, 2016|Categories: Mobile, Security, Server Hardening|Tags: , , , |0 Comments

How To Secure Your Mac

If you're a Mac user, you'll want to make sure you're using your computer as securely as possible. The common notion is that the MacOS is secure out-of-the-box, but the truth is that every Operating System is vulnerable to attacks and hackers. Last week, Apple released security updates for MacOS. The MacOS is fairly secure, [...]

By |2017-01-16T15:43:45-05:00September 5th, 2016|Categories: Mac, Security, Server Hardening|Tags: , , , , , , , , , , , |0 Comments

BASHLITE Malware Infects Over 1 Million IoT Devices

Level 3 Threat Research Labs tracked a family of malware, variously called Lizkebab, BASHLITE, Torlus and Gafgyt, that is capable of causing IoT-based DDoS attacks. Most of the infected IoT devices are digital video recorders (DVRs). What is BASHLITE? Bashlite can brute force a vulnerable device and steal its login credentials and distributes itself on [...]

By |2016-10-16T15:54:05-05:00September 2nd, 2016|Categories: Malware, Security|Tags: , , , , , , , , , |0 Comments

FairWare Ransomware Targets Linux Web Servers

If you host a website on a Linux server, you might want to watch out for the new FairWare ransomware. Not much is known about this ransomware yet, but it targets Linux web servers, deletes the web folder on the server and leaves a read_me.txt file which demands payment of 2 bitcoins as ransom to [...]

By |2016-10-16T15:54:06-05:00August 30th, 2016|Categories: Ransomware, Security|Tags: , , , , |0 Comments

Fake Windows Update Used By New Fantom Ransomware

Last week, BleepingComputer reported about a new ransomware that uses a fake Windows Update screen while it encrypts your files. This new ransomware is called Fantom Ransomware and it was discovered by an AVG malware researcher. The ransomware will install an executable program named 'a.exe.' To cloak its malicious activity, the file's properties state that [...]

By |2018-12-18T13:05:43-05:00August 29th, 2016|Categories: Ransomware, Security|Tags: , , , |0 Comments

Sweet32 Attacks Against Triple-DES (3DES) and Blowfish

Legacy ciphers such as triple-DES (3DES) and Blowfish are vulnerable to Sweet32 attacks, which let attackers decrypt HTTPS sessions even without the encryption key. Security researchers were able to use a Sweet32 attack and take authentication cookies from HTTPS-protected traffic using triple-DES (3DES) and Blowfish and recover login credentials to be able to access to [...]

By |2016-10-16T15:54:09-05:00August 25th, 2016|Categories: Attacks, Security|Tags: , , , , , , |0 Comments
Load More Posts