New crypto-ransomware “quarantines” files, downloads info-stealer

Tuesday, April 7th, 2015

Trend Micro researchers have found and analyzed a new piece of crypto-ransomware: CryptVault encrypts files, makes them look like files quarantined by an AV solution, asks for ransom and, finally, downloads info-stealer malware. It arrives on target computers after the user has been tricked into downloading and running a malicious attachment ...

Detect DLL Hijacks on Windows

Thursday, March 26th, 2015

DLL hijacking is an attack that makes applications load malicious dynamic link libraries instead of the intended -- clean and legit -- library on a Windows system. Programs that don't specify paths to libraries are vulnerable to DLL hijacking as Windows uses a priority based search order in this case to ...

Secure your wireless router

Tuesday, March 24th, 2015

There is no such thing as perfect security. Given enough knowledge, resources, and time any system can be compromised. The best you can do is to make it as difficult for an attacker as possible. That said there are steps you can take to harden your network against the vast ...

Noobs can pwn world’s most popular BIOSes in two minutes

Friday, March 20th, 2015

Millions of flawed BIOSes can be infected using simple two-minute attacks that don't require technical skills and require only access to a PC to execute. Basic Input/Output Systems (BIOS) have been the target of much hacking research in recent years since low-level p0wnage can grant attackers the highest privileges, persistence and ...

All Major Web Browsers Fall in Pwn2Own Hacking Contest

Friday, March 20th, 2015

Security researchers nabbed $552,500 in bounties at this year's Pwn2Own hacking contest, demonstrating exploits against the top four Web browsers, plus Adobe Reader and Flash Player. On Thursday, the second and final day of the competition, the star of the show was South Korean security researcher JungHoon Lee, aka "lokihardt," who ...