FBI gives shocking advice to ransomware victims

Wednesday, October 28th, 2015

Over the last few years ransomware has become a prominent way for hackers to extort money from victims. Ransomware such as Cryptolocker encrypts a victims computer and demands a payment to decrypt the files. What's surprising is how the FBI deals with victims of ransomware attacks. Last week at the ...

This Malware Can Delete and Replace Your Entire Chrome Browser with a Lookalike

Tuesday, October 20th, 2015

Security researchers have uncovered a new piece of Adware that replaces your entire browser with a dangerous copy of Google Chrome, in a way that you will not notice any difference while browsing. The new adware software, dubbed "eFast Browser," works by installing and running itself in place of Google Chrome The ...

Malware Tool That Has Your Back

Saturday, October 3rd, 2015

Security researchers at Symantec have been tracking a malware tool that, for a change, most victims wouldn’t actually mind have infecting their systems--or almost, anyway. The threat dubbed Linux.Wifatch compromises home routers and other Internet-connected consumer devices. But unlike other malware, this one does not steal data, snoop silently on victims, ...

230,000 new malware samples detected each day

Wednesday, September 16th, 2015

PandaLabs has confirmed a record increase in the creation of new malware samples. In the second quarter of 2015 alone there were an average of 230,000 new malware samples detected each day, which means a total of 21 million new types in these three months. Compared to the same period last ...

How Command and Control Servers Remain Resilient

Monday, September 14th, 2015

One of the ways that malware activity on a network is spotted is via the activity of their network activity. However, in many cases this can be difficult to detect: there have been incidents where command-and-control (C&C) servers were able to stay online and pose a problem for many years. ...