[email protected] +603-2181 3666
Extol Threat Intelligent Notification
Know the tricks of the new Locky
September 9, 2016

In this new Tales from Ransomwhere we discovered the tricks of one of the most infamous families in the landscape of the ransomware: Locky . Recently (our colleagues from Avira reported it in July) they added a new feature, it includes an offline mode so it is able to encrypt files when the connection to the server […]

We have already seen some cryptor attacks where malicious programs with different functions have been used in combination. For example, one version of the Shade cryptor checks victim computers for signs of accounting activity; if it finds any, it doesn’t encrypt the files, but instead installs remote control tools in the infected system. The bot […]

As a new school year begins, many schools sadly will be setting out to tackle one of the most serious problems now spreading across classrooms: cyber-bullying. While new technologies have opened a whole new world of possibilities for children and adults alike, they have also opened the door to a new type of bullying, where […]

In a nutshell Backdoor.OSX.Mokes.a is the most recently discovered OS X variant of a cross-platform backdoor which is able to operate on all major operating systems (Windows,Linux,OS X). Please see also our analysis on the Windows and Linux variants. This malware family is able to steal various types of data from the victim’s machine (Screenshots, […]

Except for the few of us who choose to visit faraway places at other times of the year, for the majority of us, our vacation time is coming to end. Whether we are refreshed or nostalgic for our summertime getaway, let’s make sure to take into account our IT security while we get back on […]

Almost every Android OS update includes new security features designed to make cybercriminals’ life harder. And, of course, the cybercriminals always try to bypass them. We have found a new modification of the mobile banking Trojan, Trojan-Banker.AndroidOS.Gugi.c that can bypass two new security features added in Android 6: permission-based app overlays and a dynamic permission […]

What you should know about Windows 10
September 6, 2016

It is reaching the end of its first year and now companies are asking, is it the right moment to update to Windows 10?Now that it’s becoming somewhat mature, should businesses take the plunge and invest time and money to upgrade their software? The general opinion is that yes, companies should upgrade. After all, it […]

1 58 59 60 61 62 157