The Origin of Ransomware and Its Impact on Businesses

The Origin of Ransomware and Its Impact on Businesses

In previous articles we’ve mentioned how Ransomware has wreaked havoc, invading systems and putting organizations’ reputation and stability at stake. In this article, we’ll start with the basics and describe what ransomware is and how it is used by cybercriminals to attack tens of thousands of systems by taking advantage ... Read More
Top Cryptomining Malware. Top Ransomware.

Top Cryptomining Malware. Top Ransomware.

In 2018, cryptominers have emerged as the leading attack vector used by cybercriminals to gain access into others systems. Cryptominers are getting advanced makeovers by cybercriminals doing their best to develop innovative cryptominers with ground-breaking capabilities. The recently-discovered cryptominers are not only known for their advanced features, but also for ... Read More
Malicious Cryptocurrency Mining: The Road Ahead

Malicious Cryptocurrency Mining: The Road Ahead

As cryptomining continues to rule the cybercrime scenario, cybercriminals are designing innovative ways to drain people’s cryptowallets. Scammers are still doing their best to make the most out of their resources to launch leading-edge scam attempts. The increase in scams is mainly attributed to the failure in implementing appropriate fraud ... Read More
Raising the Bar for Ethical Cryptocurrency Mining

Raising the Bar for Ethical Cryptocurrency Mining

In our last article, we discussed how cybercriminals are launching drive-by mining attacks to gain access to people’s crypto-wallets. In this article, we will continue the discussion, explain what ethical mining is and the reason why this area calls for much improvement. It is quite interesting to note that cybercriminals ... Read More
Drive-By Cryptomining: Another Way Cyber-Criminals Are Trying to Evade Detection

Drive-By Cryptomining: Another Way Cyber-Criminals Are Trying to Evade Detection

By the end of the last year, we saw a drastic rise in drive-by cryptocurrency mining activities and it is quite alarming to note that cyber-criminals are getting smarter and smarter day-by-day at avoiding detection. Interestingly, cyber-criminals can deploy drive-by cryptocurrency mining to target a much wider audience compared to ... Read More
Accessing Your Crypto Wallet Through Android Devices?

Accessing Your Crypto Wallet Through Android Devices?

Android platforms are commonly characterized by the presence of Trojan-infected apps that have built-in cryptocurrency mining codes, which means that mobile users are highly susceptible to malicious cryptocurrency mining attacks. It is quite alarming to note that cyber criminals deploy malicious APKs that are delivered through SMS spam and cryptocurrency ... Read More
The Changing Face of Malware: Malware Being Used as Cryptocurrency Miners

The Changing Face of Malware: Malware Being Used as Cryptocurrency Miners

In my last article, I was discussing how malicious cryptocurrency mining is all set to exploit technological as well as human vulnerabilities this year. In this article, I will continue digging deeper and discuss its patterns of invasions. As people keep talking about how cybercriminals used the banking Trojan Trickbot ... Read More
Malicious Cryptocurrency Mining: The “Shooting Star” in the Cybercrime Domain

Malicious Cryptocurrency Mining: The “Shooting Star” in the Cybercrime Domain

It’s quite evident how these days, attacks assume new forms along with transformations in the types of services that are widely used by consumers in a given period of time. Needless to mention, malware or malicious activities will find their presence in new applications and services as they evolve to ... Read More
Detecting Malware/APT Through Automatic Log Analysis

Detecting Malware/APT Through Automatic Log Analysis

Legacy perimeter security mechanisms can be evaded very easily. It’s disappointing, but it’s true. Innovatively-designed malware and APTs have the potential to evade even the strongest signature-based security solutions that are currently being deployed across industries. This has encouraged IT companies to think beyond prevention and to design effective detection ... Read More
GDPR in Action, Even Facebook Impacted

GDPR in Action, Even Facebook Impacted

As Europe awaits the General Data Protection Regulation (GDPR) to come into force on May 25th, Facebook is enforcing new terms of service to its users to ensure compliance with the upcoming data privacy law. It will regulate how Facebook collects and uses user data that is critical to the ... Read More
Loading...