A week after WannaCry induced worldwide panic, another vicious ransomware attack is currently underway.
Tagged With malware
French auto giant Renault became the first major French company to report being affected by Friday's ransomware attack that affected tens of thousands of computers in almost 100 countries across the world, reports Automotive News. An English plant of Renault's alliance partner Nissan was also hit by the attack.
The WannaCry ransomware attack that spread around the globe yesterday caused chaos at hospitals, manufacturing shutdowns, headaches for Microsoft and overtime for cybersecurity professionals. But the hackers responsible for this absurd attack have made relatively little in the way of profits.
An anonymous 22-year-old security researcher who goes by MalwareTech has, at least temporarily, managed to find a kill switch for the ransomware that spread across the globe yesterday. He insists his discovery was entirely accidental but experts credit his quick action for mostly stopping the malware from spreading to the United States.
It's been a rough week in Mac security. First, Checkpoint warned users of a Trojan spreading in Europe that was the first of its kind. And now, one of the most prominent video transcoding apps for Mac has a malware problem.
The hacker's name is Janit0r. You've probably never heard of him, but perhaps you've heard of his work. Janit0r is reportedly the one behind a particularly gnarly but undeniably fascinating form of malware called BrickerBot. BrickerBot, as the name implies, will brick internet of things (IoT) devices that fail a simple security test. This is surely illegal, but I love it.
So you're still using Microsoft Word. Seems like an odd decision in the year 2017, but I didn't come here to judge. I'm legitimately curious why some people continue to pump their money into the MS Office Suite, despite mounting evidence that the software offers shitty security and a historically terrible user experience. So why bother?
Patrons of the National Republican Senatorial Committee's merchandise, such as #NeverHillary stickers or Make America Great Again wristbands, may be in for a nasty surprise. Why? Well, there's a pretty good chance that credit card details from these transactions are being sold online by Russian hackers right now.
Last week, a malicious group tricked almost 10,000 Facebook users into sharing their email addresses and password with a phishing attack, discovered by Kaspersky Lab, that then went on to spread itself to those users' friends and family through seemingly innocuous Facebook messages. South America was especially hard hit by the infection.
In 2009, malware called "Skimer" surfaced and security firms took notice. Skimer is essentially malware that gives hackers full access to an ATM without needing to install any physical hardware, like a card skimmer. According to a new investigation by Kaspersky Lab, the malware is not only seems in use, but it's also become more powerful.
While online ads everywhere are becoming increasingly targeted to entice users to click on them, the same trend is taking off among criminals designing ransomware, a new report from SophosLabs has found. As awareness grows about online security, ransomware is becoming increasingly customised in order to fool more people into clicking into malicious spam.