Blog Posts Tagged with "Ransomware"
October 04, 2012 Added by:Robert Siciliano
Data can sometimes be held hostage with the help of ransomware, software that infiltrates your computer when you download an infected attachment or clicking a link within the body of an email. You can also get ransomware simply by visiting the wrong website, in what is called a drive-by...
September 24, 2012 Added by:Michael Ligh
This post discusses the undocumented windows kernel data structures for desktop objects and desktop heaps. You'll see how to use memory forensics to detect recent malware including the ACCDFISA ransomware and Tigger variants...
August 10, 2012 Added by:Headlines
Reveton is drive-by malware and unlike many viruses which activate when users open a file or attachment. Reveton can install itself when users simply click on a compromised website. Once infected, the computer immediately locks, and the monitor displays a screen stating there has been a violation of federal law...
June 28, 2012 Added by:Headlines
"When a virtualized environment detected, unlike many other Trojans that stop to work, Citadel will continue to operate... It will generate a unique-machine dependent domain name (obviously fake) and tries to connect to this server (unsuccessfully), making it to believe that the bot is dead..."
May 31, 2012 Added by:Headlines
A new Citadel malware platform is being used to deliver ransomware named Reveton, which lures the victim to a drive-by download website, and the ransomware is installed. The computer then freezes and a screen is displayed warning the user they have violated United States Federal Law...
May 07, 2012 Added by:Headlines
In the first quarter of 2012 alone, six million new malware samples were created, following the trend of increasingly of previous years. Trojans set a record as the preferred category of cybercriminals for carrying out information theft, representing 80 percent of new malware...
February 22, 2011 Added by:Don Eijndhoven
Endpoint protection will remain the name of the game, and what software vendors are doing right now isn't working. Its a failing approach that’s becoming increasingly obvious with each new report of a major breach. A change needs to be made before Organized Crime realizes its full potential...
Steps Toward Weaponizing the Android Platfor... Freid Jerome on 05-17-2013