December 19, 2016 Root of the Problem? Tordow Malware 2.0 Goes After Top Android Permissions 2 min read - Experts believe the new iteration of Tordow malware, which targets root access to take total control of infected devices, could become a worldwide threat.
December 15, 2016 Frustrating Firmware? Cybercriminal Claims to Ruin Routers With Immovable Malware 2 min read - Routers are popular targets for cybercrime. One actor in particular claimed to have permanently infected millions of routers with a firmware-based attack.
December 15, 2016 DNSChanger Exploit Targets Routers Through Web Browsers 2 min read - Although the DNSChanger exploit kit is spread through malvertising, it is designed to target vulnerabilities in victims' physical internet routers.
X-Force December 14, 2016 Ransomware Report: Top Security Threat Expected to Continue Rising in 2017 4 min read - To pay or not to pay? When it comes to ransomware, that is the question. Despite a rise in attacks, organizations are largely unaware of the threat.
Fraud Protection December 13, 2016 Nǐ Hǎo TrickBot? Dyre Successor Spreads to Asia 4 min read - The cybergang behind the TrickBot Trojan has moved into Singapore, targeting the many multinational corporations that operate in the region.
December 12, 2016 Popcorn Time Wants Your Money, but Will Settle for Your Buddy’s 2 min read - Ransomware variant Popcorn Time offers its victims a choice: Pay the ransom or sell out your buddy for a free decryption key to recover your stolen data.
December 12, 2016 August Malware Tries to Steal Credentials 2 min read - The August malware, a new Trojan recently discovered by Proofpoint, uses macros and Powershell to target customer service employees at retail companies.
December 12, 2016 Floki Bot: Funny Name, Financial Nightmare? 2 min read - Floki Bot is more versatile than most banking Trojans because it uses spear phishing methods and the RIG exploit kit to steal credit card track data.
December 8, 2016 Malvertising Poisons Banner Ads 2 min read - A recently discovered malvertising campaign known as Stegano uses steganography and other techniques that researchers have observed in similar attacks.
December 1, 2016 Browser Malware Skunks Tor 2 min read - Security-focused web browser Tor was compromised by browser malware last week. Researchers also found ransomware hiding on the Tor network.