Mobile malware masked as porn apps
Credit to Author: Anna Markovskaya| Date: Thu, 08 Feb 2018 14:14:36 +0000
Adult content is an ace in the hole for cybercriminals attacking Android devices.
Read MoreRSS Reader for Computer Security Articles
Credit to Author: Anna Markovskaya| Date: Thu, 08 Feb 2018 14:14:36 +0000
Adult content is an ace in the hole for cybercriminals attacking Android devices.
Read MoreCredit to Author: Amar Patil| Date: Thu, 08 Feb 2018 06:53:36 +0000
In Jan 2018, Greenfield, Indiana-based Hancock Health (healthcare network) was attacked by SamSam ransomware. It encrypted the files containing patients’ data which disrupted their critical services. Even though SamSam is not a new ransomware, it has evolved over a period of time. We had observed its first variant in Feb…
Read MoreCredit to Author: Oleg Glebov| Date: Thu, 08 Feb 2018 11:00:16 +0000
A purely protective solution is not enough anymore.
Read MoreCredit to Author: Jeffrey Esposito| Date: Thu, 08 Feb 2018 09:21:57 +0000
Costin Raiu joins the Kaspersky Daily team to discuss the 10th anniversary of Security Analyst Summit as well as what attendees can learn at #TheSAS2018.
Read MoreCredit to Author: Amar Patil| Date: Thu, 08 Feb 2018 06:53:36 +0000
In Jan 2018, Greenfield, Indiana-based Hancock Health (healthcare network) was attacked by SamSam ransomware. It encrypted the files containing patients’ data which disrupted their critical services. Even though SamSam is not a new ransomware, it has evolved over a period of time. We had observed its first variant in Feb…
Read MoreCredit to Author: Eric Chong| Date: Wed, 07 Feb 2018 11:45:00 +0000
On 6th December 2017, FortiGuard Labs discovered a compromised website – acenespargc[.]com. Looking into the source code, we noticed a suspicious encrypted script which the uses eval() function to convert all the characters into numbers. We used a tool called CharCode Translator to reverse the numbers back into characters. We were then able to retrieve a link which redirects to a scam page or phishing website. Part 1 Part 2 The above is just a simple example. The threat actor can actually…
Read MoreCredit to Author: Jérôme Segura| Date: Tue, 06 Feb 2018 16:21:49 +0000
![]() | |
Browsers are usually the first point of contact between victims and threat actors. With a few bits of code, crooks manage once again to freeze Google Chrome and scare users into calling for assistance. Categories: Tags: chromefreezeGooglejamtech support scams |
The post Tech support scammers find new way to jam Google Chrome (updated) appeared first on Malwarebytes Labs.
Read MoreCredit to Author: Nathan Collier| Date: Wed, 07 Feb 2018 19:30:00 +0000
![]() | |
Recently, we discovered a gold mine of fake hack apps that mine for Monero cryptocurrency and serve up annoying adware. Categories: Tags: adwareAndroidcoin hivecoin minershackhack appMobiletrojan |
The post Bogus hack apps hack users back for cryptocash appeared first on Malwarebytes Labs.
Read More