NSA-Proof “Blackphone” Gets Rooted Within 5 Minutes

Monday, August 11th, 2014

The ultra secure NSA-Proof Blackphone titled as, “world’s first Smartphone which places privacy and control directly in the hands of its users,” has been rooted within 5 minutes at the BlackHat security conference in Las Vegas this weekend. Blackphone, a joint venture between encrypted communications firm Silent Circle and Spanish Smartphone ...

Click Fraud Malware Found Lurking Inside Image Files

Monday, August 11th, 2014

Researchers have discovered click fraud malware designed to “hide in plain sight” and evade traditional security tools by embedding data into an image file. Lurk is a downloader which uses digital steganography – the art of hiding information in images, audio or video files, according to a Dell SecureWorks Counter Threat ...

Microsoft increases IE security, starts blocking old ActiveX controls

Wednesday, August 6th, 2014

As part of Microsoft's ongoing effort to improve the security of its Internet Explorer browser, the company has started blocking outdated ActiveX plugins from being enabled. ActiveX controls have been a feature of Internet Explorer for a very long time and help in enabling interactive content through the browser. Most third-party plugins such ...

YOU HAVE BEEN HACKED!

Wednesday, August 6th, 2014

Over the past 18 months, this was our conversation starter with many companies and individuals. Helping our clients prevent breaches or find their stolen data is our business. If you have been following information security, or even if you haven’t, you have probably heard of Hold Security and our work. ...

New Site Recovers Files Locked by Cryptolocker Ransomware

Wednesday, August 6th, 2014

Until today, Microsoft Windows users who’ve been unfortunate enough to have the personal files on their computer encrypted and held for ransom by a nasty strain of malware called CryptoLocker have been faced with a tough choice: Pay cybercrooks a ransom of a few hundred to several thousand dollars to ...