Category Archives: Hacker

Two Mac malware-as-a-Service offerings uncovered – Help Net Security

Two Mac malware-as-a-Service offerings, likely created by the same developer, are being offered for sale through two separate dark web portals.

Source: Two Mac malware-as-a-Service offerings uncovered – Help Net Security


Tech Support Scammers Lose Their “Hard Earned” Money in FTC Settlements

The US Federal Trade Commission (FTC) has settled with a collective of tech support scammers, who were forced to forfeit assets valued at nearly $6 million.

Source: Tech Support Scammers Lose Their “Hard Earned” Money in FTC Settlements


CIA Has been infecting routers for years

https://arstechnica.com/security/2017/06/advanced-cia-firmware-turns-home-routers-into-covert-listening-posts/


Use the Web instead

Something we all should be aware off. Check out this article.

https://ruben.verborgh.org/blog/2016/08/05/use-the-web-instead/


HP Scam Alert

http://support.hp.com/us-en/document/c05404707/


A New Ransomware Imitating Windows Activation Screen Uses Phony Search Results

A new piece of ransomware pretending to be a Windows Activation Screen is targeting American users. The copycat locks the victims` screens and then asks th

Source: A New Ransomware Imitating Windows Activation Screen Uses Phony Search Results


Respect: Windows 10 security impresses hackers | CSO Online

Windows is a popular attack target for criminals and researchers alike, but Microsoft has done a good job of making it harder to target security flaws in the OS

Source: Respect: Windows 10 security impresses hackers | CSO Online


NSA hacked? Top cyber weapons allegedly go up for auction | CSO Online

An anonymous group claims to have stolen hacking tools that might belong to the NSA and is auctioning them off to the highest bidder.

Source: NSA hacked? Top cyber weapons allegedly go up for auction | CSO Online


Dark Patterns are designed to trick you (and they’re all over the Web) | Ars Technica

No, it’s not only you—some user interfaces today intentionally want to confuse and enroll.

Source: Dark Patterns are designed to trick you (and they’re all over the Web) | Ars Technica


Researchers crack new version of CryptXXX ransomware

Researchers from Kaspersky Lab have developed a method of decrypting files affected with the latest version of CryptXXX, a malware program that combines ransomware and information stealing capabilities.

Source: Researchers crack new version of CryptXXX ransomware


When stolen data can ‘phone home’ | CSO Online

When stolen data can ‘phone home’ | CSO Online.


Privacy talk at DEF CON canceled under questionable circumstances | CSO Online

Privacy talk at DEF CON canceled under questionable circumstances | CSO Online.


Future Crimes

Future Crimes.


Ransomware 2.0 Comes to America

Ransomware 2.0 Comes to America.


Digital Drills: The Monster Machines that Mine Bitcoin

If you have heard about BitCoin mining, then have a look at the machines that do this today. Click on the link below

Digital Drills: The Monster Machines that Mine Bitcoin.


Stuxnet Worm Crafted by U.S., Israel to Thwart Iran’s Nuclear Program | News & Opinion | PCMag.com

Stuxnet Worm Crafted by U.S., Israel to Thwart Iran’s Nuclear Program | News & Opinion | PCMag.com.


Emerging Threats

Emerging Threats.


DCWG | DNS Changer Working Group

DCWG | DNS Changer Working Group.


How to bypass SOPA restrictions | Geek.com

How to bypass SOPA restrictions | Geek.com.


Duqu, Stuxnet Built on Common Platform With Other Similar Super-Malware – Security – News & Reviews – eWeek.com

Duqu, Stuxnet Built on Common Platform With Other Similar Super-Malware – Security – News & Reviews – eWeek.com.


Banking Trojans Cover Their Tracks

Banking Trojans Cover Their Tracks.


You should junk your Java! » Daves Computer Tips

You should junk your Java! » Daves Computer Tips.


Bob Rankin: How I Got Hacked… & Why You MUST Have a Backup! | PC Pitstop

Bob Rankin: How I Got Hacked… & Why You MUST Have a Backup! | PC Pitstop.


ISPionage and CyberBreak Ins | PC Pitstop

ISPionage and CyberBreak Ins | PC Pitstop.


Infections from the hackers

http://technolog.msnbc.msn.com/_news/2011/06/28/6964687-lulzsec-download-carried-trojan-


Mastercard website attacked

http://technolog.msnbc.msn.com/_news/2011/06/28/6963920-hacktivists-claim-credit-for-mastercardcom-outage


Cyber Defense


They steal a lot!

http://www.pcmag.com/article2/0,2817,2387671,00.asp


Hackers quit?

http://www.pcmag.com/article2/0,2817,2387670,00.asp


BitCoin

http://www.pcmag.com/article2/0,2817,2386816,00.asp


Criminals or Freedom fighters

Time will tell.

There is a lot going on the internet these days. Read the post and watch the clip!

http://www.pcmag.com/article2/0,2817,2386577,00.asp

http://www.pcmag.com/article2/0,2817,2386708,00.asp

http://www.pcmag.com/article2/0,2817,2386816,00.asp


Computer Warfare? Also what a virus can do!

http://www.pcmag.com/article2/0,2817,2384288,00.asp


Cyber Crime toolkits

Info about the “bad guys”

http://www.eweek.com/c/a/Security/Exploit-Toolkits-Software-That-Makes-CyberCrime-Easier-411813/?kc=EWKNLESB01302011MOSTREAD3


Info from Wikieleaks

http://www.pcmag.com/article2/0,2817,2378954,00.asp