March 18, 2016 TeslaCrypt Ransomware 3.0.1 No Longer Leaves Keys Around to Sniff 2 min read - TeslaCrypt ransomware 3.0.1 is an improvement over previous versions, making the malware highly resistant to decryption efforts.
March 17, 2016 Radamant Ransomware Can Be Tricked Into Decrypting Data Without Compensation 2 min read - Researchers recently discovered a possible solution for a Radamant ransomware variant. Here's what you need to know about this threat.
March 16, 2016 Bad Ads? Angler-Based Malvertising Reels in Mainstream Sites 2 min read - Security vendors recently discovered a massive malvertising campaign linked to the Angler exploit kit targeting top-tier websites.
March 16, 2016 Fileless Malware Loaded Into Memory via PowerShell 2 min read - Malicious macros used in phishing emails can load fileless malware, which goes into a machine's program memory and can wreak havoc.
March 14, 2016 Locky Sends You an Invoice and Makes You Pay 3 min read - The recently discovered Locky ransomware encrypts data using AES encryption and then demands hundreds of dollars. Here's what you need to know.
March 14, 2016 Old Java Flaw Boils Over as Security Pros Pierce Patch 2 min read - A Java flaw that originally surfaced in 2013 is back again, and this time, the patch isn't enough to fix the vulnerability and secure users.
Endpoint March 11, 2016 Mobile Malware GM Bot v2 Released, Price Triples 4 min read - The Android malware known as GM Bot has been updated, and this newest version comes packed with exploits ready to deploy on mobile devices.
March 10, 2016 Leaping Linux: New KeRanger Ransomware Identified as Modified V4 Linux.Encoder 2 min read - The newly discovered KeRanger ransomware can be used in attacks on Mac OS X thanks to its Linux source code, undermining many perceptions about the OS.
March 10, 2016 Java Malware Becomes a Cross-Platform Threat 2 min read - The Java malware dropper can run on most major computer platforms, making this a cross-platform threat that puts all users at risk.
Advanced Threats March 8, 2016 Ransomware Takes a Scary Turn Using JavaScript 2 min read - A relatively new type of ransomware called Ransom32 is leveraging JavaScript to bypass detection tools and infect computer systems.