
Ded Cryptor: Greedy ransomware with open-source roots
Ded Cryptor ransomware is based on EDA2 — an open-source cryptor. EDA2 was created for educational purposes, but then things went horribly wrong.
234 articles
Ded Cryptor ransomware is based on EDA2 — an open-source cryptor. EDA2 was created for educational purposes, but then things went horribly wrong.
Once, hackers wrote malware just for the fun of it, but now Trojans are serious business. However, here are five modern, weird malware samples that may be funny and strange, but they are still very dangerous.
Where ransomware originates, how blockers evolve into cryptors, and why this type of malware is cybercriminals’ favorite tool.
Database with millions of Twitter accounts is being sold on the Darknet. At least 32 million of them are unique and probably active. What you need to do is change your password ASAP!
Zcryptor is a hybrid, part ransomware and part worm. It encrypts files and copies itself onto external media.
Ransomware is a tough nut to crack — and while it’s distracting you by encrypting your files, it may also be turning your computer into a zombie.
The Petya ransomware installer now includes another ransomware called Mischa that complements it.
Locky and Petya ransomware strains took the world by storm when they shouldn’t be successful at all.
Ransomware is mostly the end-user problem. However, businesses get hit too, and hit hard, especially the smaller ones.
CryptXXX ransomware encrypts files, steals data and bitcoins. Sounds serious, but we have a solution!
It’s not common that the ransomware criminals can be outsmarted. But sometimes they can be.
These incidents sound like a detective story, but are taken from real life. It’s almost impossible to avoid targeted hacking and here we explain why is that so.
Cryptolocker was bad, CTB-Locker was even worse, and new Petya ransomware is a freaking disaster.
CTB-Locker comes back and strikes 70 web server from 10 countries across the globe. Who is at risk and what should they do?
Kaspersky Lab announced WISeID Kaspersky Lab Security, a special edition of a mobile app jointly developed with WISeKey.
Over the first week of 2016, a handful of important cybersecurity news came in, including those directly and indirectly affecting businesses worldwide.
A renovated version of TeslaCrypt ransomware has recently affected numerous devices in Japan and Nordic countries.
Here are some simple yet effective ways to protect your files from infection by ransomware.
An FBI representative speaking at the 2015 Boston Cyber Security Summit gave a piece of advice on ransomware which the San Francisco Chronicle called “disquieting”: he said it’s recommended victims
Today’s smartphones are full-fledged computers much more powerful than the desktops you used 10 years ago. Your device is very likely to contain data the cybercriminals are after, like banking data.
Two young individuals were arrested by Dutch police on suspicion of involvement in CoinVault ransomware attacks.