In additional to familiar malware processes, FireCrypt ransomware is capable of launching DDoS attacks after encrypting victims' files.
Revised Mobile Banking Trojans Faketoken and Tordow 2.0 Threaten Customer Information and Business Integrity
Banking Trojans already pose a huge threat to finance firms. Now, cybercriminals have added encryption capabilities to two existing ransomware campaigns.
The Ameriprise leak exposed sensitive financial data and highlighted the importance of password protection, especially when backing up confidential data.
Before leaving for a business trip, be sure to keep these basic travel security tips in mind to keep your data safe from local adversaries.
The recently discovered CryptoLuck ransomware is distributed by the RIG-E exploit kit, suggesting that it may target a large pool of victims.
The race is on to devise an effective method of quantum-safe encryption to cope with the security implications of this emerging technology.
Ransomware is already annoying, but a new strain of CryPy ransomware is appearing on PCs with its Python-based encryption and forcing victims to pay up.
Users in the market for encryption software are generally astute when it comes to security. They’re unlikely to be duped by social engineering ploys. Ironically, this makes them valuable targets for cybercriminals. According to Kaspersky Lab...
Before Facebook Messenger launched its end-to-end encryption capability in July, IT professionals were hesitant to use the app for enterprise messaging.
Like the well-known Petya, the Mamba, or HDDCryptor family of ransomware, acts by holding a computer hostage. When it infects a PC, it encrypts data present on the machine as well as the computer’s master boot records, thus rendering the...