Home Tags Password-protected

Tag: password-protected

Web exposed MongoDB installs wiped by bitcoin ransoming script scum

Patch or perish Some 2,000 MongoDB installations have been compromised by an attacker demanding administrators pay 0.2 bitcoins (US$206) to have lost data returned. Victor Gevers...

Microsoft Finds Cerber Ransomware Activiity Increased During Holidays

Microsoft security researchers warn that after a brief quiet period, the Cerber ransomware family has reemerged with a vengeance to target holiday shoppers and...

Research on unsecured Wi-Fi networks across the world

The very nature of wireless Wi-Fi networks means that hackers or criminals simply need to be located near an access point in order to...

PoisonTap Hacking Tool Compromises Computers via USB Stick

If you step away from your computer, an attacker could quickly insert a USB stick and take control using a series of vulnerabilities. The...

Meet PoisonTap, the $5 tool that ransacks password-protected computers

EnlargeSamy Kamkar reader comments 48 Share this story The perils of leaving computers unattended just got worse, thanks to a newly released exploit...

Russia-linked phishing campaign behind the DNC breach also hit Podesta, Powell

The spear-phishing e-mail received by Clinton campaign staffer William Rinehart matches messages received by both former Secretary of State Colin Powell and Clinton campaign...

Second hacking group targets SWIFT-connected banks

Odinaff shares links with Carbanak A second group of hackers – Odinaff – has broken into the SWIFT system, the fulcrum of the global financial...

Odinaff Trojan Targeting SWIFT Messaging System Used by Banks

Symantec warns of the growing risk from a malware variant that is targeting the SWIFT messaging system that banks use for financial transfers. Symantec issued...

Polyglot – the fake CTB-locker

Cryptor malware programs currently pose a very real cybersecurity threat to users and companies.Clearly, organizing effective security requires the use of security solutions that...

New batch of leaked Colin Powell e-mails lambasts Trump and Clinton

reader comments 27 Share this story Add former Secretary of State Colin Powell to the list of high-ranking Washington insiders whose leaked...

A malicious pairing of cryptor and stealer

We have already seen some cryptor attacks where malicious programs with different functions have been used in combination.For example, one version of the Shade...

Shade: not by encryption alone

Malefactors continue to expand the features of ransomware as they try to extract maximum benefit from the compromise of infected computers. We recently found...