Searching for more information about your favorite celebrities online could get you hacked according to the McAfee 2019 list of the most dangerous celebrities to search for online. For the thirteenth year in a row, the McAfee has researched which famous individuals generate the riskiest search results that could potentially expose fans to malicious websites …
New EU-wide research project carried out by the EUIPO has uncovered over 4,000 files containing malware or potentially unwanted programmes from more than 1,000 websites suspected of sharing illegally protected content. The 4 000 malicious files originated from approximately 100 individually developed pieces of malware, often marketed as being useful user software, including fake game …
For long users have been warned of third-party Android apps might be hiding some malware as well. But your hyper-vigilant download habits should extend beyond your smartphone. You need to keep an eye on your desktop Chrome extensions as well. As with Android apps, though, Chrome extensions can sometimes hide malware or other scourges, even …
UK businesses are most likely to pay up following a ransomware attack, new figures have claimed. Research by security firm Malwarebytes found that almost half (49 per cent) of UK businesses would pay ransom following a ransomware attack. Globally, the figure sits somewhat lower, at 42 per cent, according to Malwarebytes’ “Second Annual State of …
Following the outbreak of the Petya-based malware in Ukraine, the author of the original version, Janus, decided to release his master key, probably closing the project. You can read the full story here. Based on the released key, Malwarebytes has prepared a decryptor that is capable of unlocking all the legitimate versions of Petya (read …
According to Gartner, there are currently over 6 billion IoT devices on the planet. Such a huge number of potentially vulnerable gadgets could not possibly go unnoticed by cybercriminals. As of May 2017, Kaspersky Lab’s collections included several thousand different malware samples for IoT devices, about half of which were detected in 2017. The number …
A new report by Corero Network Security suggests that offering DDoS protection as a service is a viable business idea. Out of its respondents, 82 percent see a “clear business opportunity” in providing DDoS protection as a service to its customers. Also, 93 percent see providing DDoS mitigation in relation to other types of security …
According to a company blog post out today, by brand protection company CSC, citing Amy Mushahwar, counsel and Chief Information Security Officer at Washington, D.C. law firm ZwillGen PLLC, says: “New domains (new gTLD’s) are being registered as phishing sites and for drive-by downloads of malware.”….“Nefarious uses have been very widespread. It’s incumbent upon ICANN …
We’re at a crisis point now with regard to the security of embedded systems, where computing is embedded into the hardware itself — as with the Internet of Things. These embedded computers are riddled with vulnerabilities, and there’s no good way to patch them. It’s not unlike what happened in the mid-1990s, when the insecurity …