Monday , 27 March 2017
Home » Tag Archives: attack

Tag Archives: attack

Hackers: we will remotely wipe iPhones unless Apple pays ransom

Hackers are threatening to wipe out a large cache of data from 300 Million Apple accounts unless a ransom is paid. Labelling themselves as the ‘Turkish Crime Family’, the group or individual is demanding that £75,000 is to be paid in popular crypto-currency Bitcoin, or £100,000 worth of iTunes gift cards in exchange for deleting the data on the Apple ... Read More »

IT security pros and network operators view DDoS attacks as an increased concern in 2017

DDoS attacks are a greater security threat to businesses in 2017 than ever before, and Internet Service Providers (ISPs) need to do something about it according to a new survey of IT security professionals and network operators released today from Corero Network Security. The annual study, the Corero DDoS Impact Survey 2017, polled top technology decision makers and security experts ... Read More »

Alleged C.I.A. Hacking Documents Reinforce Need for SSL Traffic Inspection

Duncan Hughes, Systems Engineering Director, EMEA,
A10 Networks

WikiLeaks this month released thousands of documents containing several hundred million lines of code that it claims shine a light on the solutions and tactics the Central Intelligence Agency used to spy and hack into devices, including smartphones, computers and smart televisions. While there are still questions around the documents’ authenticity, if they are legitimate they show that the C.I.A. ... Read More »

Ixia’s security report shows organizations still vulnerable to brute force attacks

Ixia, a leading provider of network testing, visibility and security solutions, has announced the release of the first Ixia Security Report, a summation of 2016’s biggest security events including findings from Ixia’s Application and Threat Intelligence (ATI) Research Center, which uses a global network of honeypots and web crawlers to actively identify known and unknown malware, attack vectors and application ... Read More »

Cyber threat on the rise to UK businesses – NCSC and NCA Report

A report looking into cyber threat to UK business warns attacks are “significant and growing.” The report, which was conducted by the National Crime Agency (NCA) and National Cyber Security Centre (NCSC), highlighted ransomware as the most common cyber extortion method. Ransomware is a malware that locks a user out of their device after it has covertly installed itself on ... Read More »

How to Protect Yourself or Organization from Malware

Ransomware is one of the most infuriating kinds of cyber attack that’s cropped up over recent years, with hackers raking it in from hapless comouter users who just want their files back. Whilst we all hope for a perfect online community where such things wouldn’t happen, it’s evident that future is a long way away. So the team at AppRiver have ... Read More »

Researcher pops locks on keylogger, finds admin’s email inbox

Trustwave researcher Rodel Mendrez has gained access to the inbox of the criminal behind a commercial keylogger used to attack industries including finance, cloud services, logistics, foreign trade, and government. Mendrez’s reverse engineering effort found credentials buried within the Hawkeye keylogger that lead through redirection to the author’s inbox. Attackers behind Hawkeye were siphoning from compromised machines browser, email, and ... Read More »

Guru Briefing: SentinelOne on Ransomware

News from SentinelOne today has announced a new variation of the CryptXXX Ransomware, which they’ve clocked earning over $50,000 in Bitcoin payouts for its proponents thus far. As with other popular ransomware strains that have been improving with each iteration, the new CryptXXX is unbreakable by decryption tools and has already proven to be very successful in forcing ransom payments. ... Read More »

Botnet-powered account takeover campaign hit unnamed bank

A single attacker has mounted two massive account takeover (ATO) campaigns against a financial institution and an entertainment company earlier this year, and used a gigantic botnet comprised of home routers and other networking products to do it. “ATO attacks (also known as credential stuffing) use previously breached username and password pairs to automate login attempts. This data may have ... Read More »

DDoS attack leaves TeamViewer users in the dark

TeamViewer customers are still unable to access the company’s remote support services 24 hours after the company suffered a DDoS attack. According to IT Pro sources, the service, which allows IT teams to remotely access users’ desktops in order to resolve support issues, is inaccessible to businesses across the UK, Europe and the US. Sources said the company appears to ... Read More »