Onion Ransomware News: Improved Version of CTB-Locker Emerges
New version of CTB-Locker, a ransomware that uses Tor and Bitcoin to evade detection and takedowns, should be avoided at all costs.
99 articles
New version of CTB-Locker, a ransomware that uses Tor and Bitcoin to evade detection and takedowns, should be avoided at all costs.
What are the key differences between Kaspersky Total Security and Kaspersky Internet Security? Which is the best choice for you? Which protects better? Let’s take a closer look.
“British Prime Minister David Cameron to Ban Encrypted Messengers” — Headlines like this are appearing here and there. But what happened exactly?
Cryptolocker is still making the rounds, even though its peak seems to have passed. Or is it just an illusion? How does it affect businesses? Read some real stories and explanations in the new blogpost at Kaspersky Business.
CES 2015 was a superb event in terms of the amount of new technology per square foot. But, from an information security standpoint, it did not appear all that positive.
In this Talk Security podcast, Threatpost’s Chris Brook and Brian Donohue discuss the move to encrypt the Web, the Regin APT campaign and more.
Google’s mobile operating system joins Apple’s iOS in offering full disk encryption by default to all users in its newest version — Android 5.0 aka Lollipop.
”Dear Chairman, dear Vice Chairman, dear members of the board, let me present to you the annual report… Oops… Just a moment, we are having some technical issues…”
We have bought our very own Blackphone to check its security firsthand.
Yahoo plans to implement end-to-end encryption for all of its mail users, giving normal, non-technical users the power to communicate securely and privately.
Facebook fails to fully encrypt data on its Instagram mobile app, which puts user security and privacy at risk.
Making a case for password reuse, Google hiring hackers to fix the Internet, Apple bolsters security across its services with strong Crypto, plus various fixes and more.
We hear a lot about so-called MITM attacks, but what is it in a nutshell? Let’s look at the “layman” explanation.
On the trail of Cabir’s “jubilee”, a new story about Nokia’s Symbian surfaced, involving stolen code, blackmail, charity donation, and a bag with several million euros. One day it could become a script for a criminal drama, but for now it is a story about sensitive data mishandling.
Our study during World Cup indicates one in four networks are dangerous and you must take care to avoid substantial loss.
This is a short excerpt from what is said to be unearthed medieval manuscript, describing a way of keeping secrets. While we are not sure it’s authentic, the method described seems quite useful today.
Google is releasing a tool that ensures all data passing out of its Chrome browser is encrypted in transit, resolving the problem of relying on others’ crypto.
OpenSSL reported six new vulnerabilities just eight weeks after Heartbleed. Does it mean that OpenSSL is heading for a disaster, or is it on its way to healing?
Something very weird is going on with the popular free whole-disk encryption suite TrueCrypt. The story is still developing, but it does look like the suite ceases to exist right
Many Internet-connected smart home systems contain vulnerabilities that could expose the owners of those systems to physical and digital theft.