Dridex’s newest campaign steals credit card information using an Automatic Transfer System (ATS) mechanism. The malware is capable of compromising users’ credentials to hijack an end user session to…
A new banking Trojan discovered by ESET targets banking applications on Android devices. The malware can steal the login credentials of mobile banking customers and has the ability to bypass Two…
Cerber: Ransomware Speaks Bitcoin Demand
A new form of ransomware has emerged called “Cerber” that not only encrypts your files but will also use a text-to-speech function to read the ransom demand out loud to you. The ransomware is thought…
CryptoJoker – Ransomware You Can Negotiate With
New Breed of Crypto-Ransomware There is a new breed of crypto-ransomware software emerging from the depths of the darknet called “CryptoJoker,” which allows a victim to negotiate a fair ransom…
Gone Phishing: Why Human Resources is Vulnerable to Crypto Ransomware Attacks
I recently received an email that came into our ticketing system which at first glance seemed to be a woman submitting a resume to WatchPoint. The email was simple and introduced Charlotte Roye, who…
Why Didn’t My AntiVirus Detect Cryptowall….again!?
I’ve previously written an article about why antivirus (AV) software has such a difficult time detecting cryptolocker, cryptowall, and other ransomware when it infects a network. I had expected that…
Lock Down Exchange from Brute-Force Attack
A brute-force attack is a common threat faced by web developers where an attacker attempts to crack a password by systematically trying every possible combination of letters, numbers, and symbols…
Tips to Help Stop a Brute-force Attack
A brute-force attack is a common threat faced by web developers where an attacker attempts to crack a password by systematically trying every possible combination of letters, numbers, and symbols…
Fast Facts Regarding Linux Root User
If you are new to Linux you may have a few questions about the root user and its intended use. It’s imperative that you understand when you should or shouldn’t use the root account and the dangers of…