Cybercrooks love it when you put off updates and wait to see how others get on first… you become their low-hanging fruit. Source: Sophos
Cybercrooks love it when you put off updates and wait to see how others get on first… you become their low-hanging fruit. Source: Sophos
Download PDF version Download EPUB In late 2014, we published predictions for how the world of cyber threats may evolve in 2015. Four of the nine predictions we made were directly connected with threats to businesses. Our predictions proved accurate – three of the four business-related threats have already been fulfilled: Cybercriminals embrace APT tactics for […]
While happily working on your computer getting stuff done, little do you suspect that in the background, your important files are being subjected to a military-grade encryption to which you don’t have the key. Suddenly, a Cryptolocker alert appears on the screen—you have only days to pay the ransom or lose all your encrypted files […]
At the end of 2013 the first signs of what would eventually become one of the most lucrative attacks for cybercriminals were spotted. Cryptolocker is the name of the most popular family of ransomware, which has ended up being used as the name for all threats of this type. The threat always works on the […]
Adobe and Microsoft today independently issued software updates to plug critical security holes in their software. Adobe released a patch that fixes a whopping 78 security vulnerabilities in its Flash Player software. Microsoft pushed a dozen patch bundles to address at least 71 flaws in various versions of the Windows operating system and associated software. […]
While passwords are still an essential topic in IT-Security, the recovery and cracking of those is as well. There are several tools focusing on password recovery while two of them stand out of the crowd: Hashcat/oclHashcat and John-the-Ripper (JtR). We already mentioned Hashcat in our blog on account password security here. Jens Steube – the mind behind […]
The war in Syria, which began several years ago, has recently become one of the most widely reported events in the media. Along with the growing interest of the international community in Middle East events, “Nigerian” scammers have also jumped on the bandwagon. Over the last few months, we have recorded an increase in the […]
I recently heard from a source in law enforcement who had a peculiar problem. The source investigates cybercrime, and he was reaching out for advice after trying but failing to conduct undercover buys of stolen credit cards from a well-known underground card market. Turns out, the cybercrime bazaar’s own security system triggered a “pig alert” and brazenly […]