The End of Bitcoin Ransomware?
Section 1. Introduction Bitcoin, a virtual currency generated through peer-to-peer technology and not controlled by any central authority, is used not only for paying for goods and services, but also...
View ArticleAn Overview of the Payment Card Industry (PCI)
The payment card industry consists of all the organizations which store, process and transmit cardholder data and carry transactions through debit and credit cards. Many standards are developed to...
View ArticleAll About Carding (For Noobs Only)
Disclaimer: The Article writer’s intent is to spread awareness about the carding. The writer is not responsible if any damage occurs. This is for educational purpose only. Hello Guys, if you were a...
View ArticleLatest Trends in Cybersquatting
Section 1. Introduction Protecting company’s intellectual property, including designs, patents, trade names, and domain names, is an essential condition for establishing a successful business. The...
View ArticleNew Born Macro Malware Dropping Rootkits Using a Fileless Infection Vector
Getting Serious While Shamoon still shrieks “I am back” all over GCC countries, a completely new “bad boy” spam hits the servers. This VBScript malware document seems to be newborn or revamped, had no...
View ArticleInsurance Against Ransomware Threats
Section 1. Introduction Although there is a vast amount of information on the risks of cyber-attacks, not all businesses engage in preparation and implementation of comprehensive cyber risk management...
View ArticleExclusive – A Close Look at the Largest Credential Harvesting Campaign Via an...
Exclusive: MalwareMustDie discovered a criminal gang that is using SSH TCP direct forward attack technique in a large-scale operation. The popular researcher MalwareMustDie published his first analysis...
View ArticleMore PowerShell Remoting Artifacts
In Part 1 of this series, we looked at PowerShell remoting artifacts under various Event IDs and ways to gather more information from those events and relate it to the investigation context. In this...
View ArticleA4 Black Friday: Massive Ransomware Attack Leveraging on Wannacry Hit Systems...
WannaCry ransomware hit Windows computers worldwide A massive malicious ransomware-based attack made the headlines on Friday, first targeting UK hospitals and Spanish banks before rapidly spreading...
View ArticleWhy Was Wanacrypt0r 2.0 So Successful?
1. Introduction On 12th of May 2017, unknown hackers launched a large-scale global ransomware attack. It affected more than 230,000 computers. The ransomware (WanaCrypt0r 2.0) used for conducting the...
View ArticleJudy Malware: Millions of Android Devices Potentially Exposed
It has happened again; security experts have discovered a malicious application inside the official Google Play store. The new malware, dubbed “Judy,” is designed to infect Android devices and generate...
View ArticleHow to Protect Your Right to Personal Identity in the Digital Era
As stated by the FBI’s Internet Crime Complaint Center (IC3), identity theft “occurs when someone appropriates another’s personal information without their knowledge to commit theft or fraud.” Identity...
View ArticleHazards of Identity Theft
Scenario: You buckle down each day to bring home the bacon and bolster yourself as well as your family. You know how to keep your credit clean so you can appreciate the advantages of that diligent...
View ArticleUS Regions Most Vulnerable to a Cyber Attack
1. Introduction In December 2016, the Identity Theft Resource Center published a report indicating the top 10 cyber-risk vulnerable U.S. regions. The ten regions (ordered from high to low level of...
View Article“Robin Hood” Ransomware and Psychological Manipulation Techniques
1. Introduction In 2016, the ransomware CryptMix gained popularity. CryptMix is based on source code of other infamous types of malware, such as CryptoWall 3.0, CryptoWall 4.0 and CryptXXX. In...
View ArticleSAP SECURITY FOR CISO: SAP Attacks and Incidents
If you read this series, you already know enough about SAP ERP Security to discover a real impact of having insecure SAP implementation. Recently, Crowd Research Partners have released ERP...
View ArticleMassive Petya Attack: Cybercrime or Information Warfare?
Hits organizations in several states Just five weeks after the WannaCry massive attack, a new wave of ransomware-bases attack hit targets in various countries worldwide. Like WannaCry massive attack,...
View ArticleAlphaBay Market: What is the Impact of the Cyber-criminal Underground?
The AlphaBay Market was shut down by the law enforcement AlphaBay Market was the largest black marketplace on the Dark Web, it was an excellent aggregator for buyers and sellers of any kind of illegal...
View ArticleThree Different Kinds of Online Scams
There are countless ways and endless criminals online looking to steal your personal information or gain access to your financial accounts. Being able to identify the most common types of online scams...
View ArticleSteal iCloud Keychain Secrets via OTR
Apple iCloud Keychain In Mac OS 8.6, Apple introduced its Keychain password management system. Still integrated into every Mac OS release since then, Keychain provides a centralized storage for...
View Article
More Pages to Explore .....