Archive for February, 2016
Posted by Siren on February 27, 2016
MPC Cleaner claims to cure a vast spectrum of computer performance issues and promises users to protect their web browsing environment. This sure appears to be a luring deal as long as the utility does everything stated. On the other hand, users have been complaining about high intrusiveness, false positives and harsh interference with the […]
Read more →
Posted by Siren on February 24, 2016
The use of RSA-4096 public-key encryption is not restricted to legitimate purposes such as the protection of classified governmental or military documents. This extremely strong cryptosystem has also become a dangerous instrument in extortionists’ hands. Ransomware plagues like TeslaCrypt demonstrate how technologies preventing data leakage can turn into an inalienable part of cybercrime infrastructure. The […]
Read more →
Posted by Siren on February 19, 2016
Operators of the Locky ransomware fraud appear to be exercising their extortion skills in several ways. They deposit their payload onto computers through a technique similar to the one leveraged by distributors of the Dridex banking Trojan. The virus tweaks filenames along with encrypting files themselves, thus considerably aggravating the recovery routine. And of course […]
Read more →
Posted by Siren on February 16, 2016
With the browser plugin called Torrents Time, computer users are able to stream torrents right inside their browser. This lightweight applet supports both Windows and Mac OS X, and it’s compatible with Mozilla Firefox, Google Chrome, Internet Explorer and Safari. On the one hand, people no longer have to install the client proper, which is […]
Read more →
Posted by Siren on February 16, 2016
A new cyber threat dubbed T9000 is targeting individual users and organizations through tactics featuring a high level of obfuscation. Some researchers consider this backdoor to be a tool meant exclusively for industrial espionage, but the patterns of its propagation prove a much broader attack surface. It was found to surveil victims’ Skype conversations and […]
Read more →
Posted by Siren on February 13, 2016
The browser redirect routine involving z.moatads.com and js.moatads.com is advantageous for merchants who thus advertise their products, but it’s a headache for end users who repeatedly visit landing pages with annoying recommendations. When dissecting these instances, researchers discovered that they are sustained by adware, which is a category of mild-impact infections hijacking browsers to capture […]
Read more →
Posted by Siren on February 2, 2016
The ransom trojan dubbed TeslaCrypt has substantially evolved over the course of almost a year that it has been around. The original variant was detected in late February 2015, and the security industry is now dealing with the 3rd generation of this infection. The tweaks made to its code and operation ever since include the […]
Read more →