malware

ComputerWorldIndependent

How to protect Windows 10 PCs from ransomware

Credit to Author: Preston Gralla| Date: Wed, 10 Jan 2018 03:00:00 -0800

CryptoLocker. WannaCry. Petya. Bad Rabbit. The ransomware threat isn’t going away anytime soon; the news brings constant reports of new waves of this pernicious type of malware washing across the world. It’s popular in large part because of the immediate financial payoff for attackers: It works by encrypting the files on your hard disk, then demands that you pay a ransom, frequently in Bitcoins, to decrypt them.

To read this article in full, please click here

(Insider Story)

Read More
MalwareBytesSecurity

RIG exploit kit campaign gets deep into crypto craze

Credit to Author: Jérôme Segura| Date: Tue, 09 Jan 2018 17:11:16 +0000

We take a look at a prolific campaign that is focused on the distribution of coin miners via drive-by download attacks. We started to notice larger-than-usual payloads from the RIG exploit kit around November 2017, a trend that has continued more recently via a campaign dubbed Ngay.

Categories:

Tags:

(Read more…)

The post RIG exploit kit campaign gets deep into crypto craze appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

A week in security (January 1-8)

Credit to Author: Malwarebytes Labs| Date: Tue, 09 Jan 2018 15:48:57 +0000

A compilation of notable security news and blog posts from January 1 to January 8, including Meltdown and Spectre updates, miners, wire fraud refunds, and fake apps on Google Play.

Categories:

Tags:

(Read more…)

The post A week in security (January 1-8) appeared first on Malwarebytes Labs.

Read More
QuickHealSecurity

Meltdown and Spectre: Quick Heal compatibility update

Credit to Author: Rajib Singha| Date: Tue, 09 Jan 2018 12:15:27 +0000

This is an important advisory for our readers about the recently discovered CPU exploits called Meltdown and Spectre. Product Compatibility: Microsoft had requested security ISVs (Independent Software Vendors) to perform testing with the January 3 update in order to ensure their products are compatible with the Microsoft update. Based on the…

Read More
QuickHealSecurity

What do we need to know about the CPU exploits Meltdown and Spectre?

Credit to Author: Quick Heal Security Labs| Date: Thu, 04 Jan 2018 13:02:09 +0000

What exactly is a vulnerability? A security vulnerability (also known as a security hole) is a security flaw detected in a product that may leave it open to hackers and malware. Using such vulnerabilities, attackers can exploit the affected system/product for their profit in various ways. What is an exploit? Exploits…

Read More
QuickHealSecurity

What do we need to know about the CPU vulnerabilities Meltdown and Spectre?

Credit to Author: Quick Heal Security Labs| Date: Thu, 04 Jan 2018 13:02:09 +0000

What exactly is a vulnerability? A security vulnerability (also known as a security hole) is a security flaw detected in a product that may leave it open to hackers and malware. Using such vulnerabilities, attackers can exploit the affected system/product for their profit in various ways. What is an exploit? Exploits…

Read More
QuickHealSecurity

Android banking Trojan targets more than 232 apps including apps offered by Indian banks

Credit to Author: Bajrang Mane| Date: Wed, 03 Jan 2018 07:27:59 +0000

Quick Heal Security Labs detected an Android Banking Trojan that targets more than 232 banking apps including those offered by Indian banks. The malware is known as Android.banker.A9480. Like most other Android banking malware, even this one is designed for stealing login credentials, hijacking SMSs, uploading contact lists and SMSs…

Read More
QuickHealSecurity

Android banking Trojan targets more than 232 apps including Indian Banks

Credit to Author: Bajrang Mane| Date: Wed, 03 Jan 2018 07:27:59 +0000

Quick Heal Security Labs detected an Android Banking Trojan that targets more than 232 banking apps including Indian banks. The malware is known as Android.banker.A9480. Like most other Android banking malware, even this one is designed for stealing login credentials, hijacking SMSs, uploading contact lists and SMSs on a malicious…

Read More