Latest Version of GandCrab Ransomware

Latest Version of GandCrab Ransomware

For anyone learning about cybercriminals, they must first recognise that these criminals are not only devious in their design of attack software, but always want to go for the “low hanging fruit.” In technology, the most vulnerable “fruit” continues to be legacy systems, and the latest version of GandGrab ransomware proves that they will continue to pursue this avenue because it brings the most success. Legacy systems are more difficult
The Buzz About Fileless Malware

The Buzz About Fileless Malware

When it comes to being devious, cybercriminals are relentless and in their world this means seeking out new ways of thievery. Those that specialise in malware have been using standard methods for the last number of years. As security software and firewalls begin catching them, they are now developing a newer way to access your data and this involves what is being called “fileless malware.” Cybercrime relies on the fact

Cryptowall 3.0 Threat Rising

The stakes are now higher as an old malware nemesis has reared its ugly head once again. Cryptowall 3.0 has been launched using yet another devious method through ‘help file’ attachments sent via email and e-fax. Appearing as a harmless ‘.chm’ file, the hidden malware was opened and at once invaded individual computers, making their next move to the entire network. As with all forms of ransomware, when the threatening

Apple Store Apps Hit with Malware

Users of Apple iPhone and iPad products have been a bit stunned as the release of the information came forward regarding dozens of apps that contained iOS malware that were placed on the Apple Store. The malware, called XcodeGhost, was discovered and then removed from dozens of apps available for download from the store. According to Alibaba, a report from Palo Alto Networks, Inc. indicated that Chinese app developers were

Malware Found on Security Cameras Available Through Amazon

Malware on security cameras? Security comes in many forms, and they’re not always compatible with one another. That’s what a security researcher named Mike Olsen found when he went to set up an outdoor surveillance system that he had purchased on Amazon from a seller called Urban Security Group. As Olsen writes in a blog post, he found himself frustrated by the cameras’ configuration interface, so he looked at their administrative