It’s not widespread, but experts warn Apple devices open to malware and ransomware. By Jason Murdock June 9, 2017 If you own an Apple device – be it a Macbook or iPhone – you are instantly safe from malware and viruses, right? After all, these are not Windows devices, they are… Continue reading Apple Macs CAN get viruses as security myth busted by experts
Spectre Ransomware May Be Coming for you Soon
9th June 2017 By Lawrence Abrams A new ransomware was discovered today by MalwareHunterTeam called Spectre. This ransomware is currently in testing mode by the developer, but due to the time and effort that has been put into it’s creation, I would not be surprised to see this go into distribution soon. With this… Continue reading Spectre Ransomware May Be Coming for you Soon
ADT updates its Pulse security app to lock out rooted or otherwise modified devices
9th June 2017 By Ryan Whitwam There are plenty of home automation and security platforms these days, but some consumers like to stick to what they know, and ADT has been doing home security for a long time. It offers its own camera and sensor systems,… Continue reading ADT updates its Pulse security app to lock out rooted or otherwise modified devices
Latest Malware to Hit the Headlines is JUDY
Another instance of what might happen if devices are not properly secured with the right security tools like antivirus software was revealed recently when a multitude of Android devices downloaded a number of “JUDY branded apps” available under “cooking and fashion” games categories respectively in Google Play. Nothing seemed wrong at first. In fact, the… Continue reading Latest Malware to Hit the Headlines is JUDY
Android Smartphones Targeted by WannaCry Lookalike
8th June 2017 By Catalin Cimpanu Crooks in China have developed an Android ransomware that uses similar graphics to the WannaCry ransom note in an attempt to scare and trick users into quickly paying the ransom. Spotted by Qihoo 360 researchers, crooks are spreading this ransomware via Chinese gaming forums. The malicious app… Continue reading Android Smartphones Targeted by WannaCry Lookalike
Cisco Patches Critical Flaws in Prime Data Center Network Manager
By Michael Mimoso June 8, 2017 A debugging tool left on in deployments of Cisco’s large-scale data center management software could be remotely accessed and allow an attacker to run code with root privileges. Cisco made an update available that patches this and… Continue reading Cisco Patches Critical Flaws in Prime Data Center Network Manager
VMware Patches Critical Vulnerabilities in vSphere Data Protection
By Chris Brook June 8, 2017 VMware fixed two critical vulnerabilities in its vSphere Data Protection solution this week that could have allowed an attacker to execute commands on the virtual appliance, among other outcomes. The Department of Homeland Security’s CERT encouraged users… Continue reading VMware Patches Critical Vulnerabilities in vSphere Data Protection
LatentBot piece by piece
June 8, 2017 by Malwarebytes Labs LatentBot is a multi-modular Trojan written in Delphi and known to have been around since 2013. Recently, we captured and dissected a sample distributed by RIG Exploit Kit. The main executable is a persistent botnet agent which downloads additional modules and reports about the performed… Continue reading LatentBot piece by piece
Adware the series, part 5
See Also: Adware the series, part 1 Adware the series, part 2 Adware the series, part 3 Adware the series, part 4 June 8, 2017 by Pieter Arntz In this series of posts, we will be using the flowchart below to follow the process of determining which adware we are dealing with. Our… Continue reading Adware the series, part 5
Hackers Exploited Biggest Vulnerability of Two-Factor Authentication: You
2FA won’t be as safe if you are not careful when online Jun 7, 2017 20:23 GMT · By Gabriela Vatu Two-factor authentication is a great way to secure your account, but even this method has a weakness that you might not even expect: you. This might be a bit… Continue reading Hackers Exploited Biggest Vulnerability of Two-Factor Authentication: You