What Is the Low Orbit Ion Cannon (LOIC)?

What Is the Low Orbit Ion Cannon (LOIC)?

The Low Orbit Ion Cannon (LOIC) is a network stress testing application created by Praetox Technologies. It is used as an attack tool in DoS/DDoS attacks. LOIC is a Windows application that ...
Ransomware payment

Criminalize Ransomware Payment? A Bad Solution for a Bad Problem

On June 24, the Washington Post came up with a simple solution for the ransomware problem that is plaguing the U.S. critical infrastructure in general, and municipalities in particular. The Post opined ...
Security Boulevard
The Cost of Ransomware Attacks on Cities

The Cost of Ransomware Attacks on Cities

Ransomware attacks on cities are becoming more prevalent with ransom demands increasing with each attack. Recently, two cities have gone against conventional wisdom and decided to pay the ransom amount demanded by ...
Using osquery for remote forensics

Using osquery for remote forensics

| | attacks, osquery
System administrators use osquery for endpoint telemetry and daily monitoring. Security threat hunters use it to find indicators of compromise on their systems. Now another audience is discovering osquery: forensic analysts. While ...

Report: Concerted Global Cyber Attack Could Disrupt Global Economy

According to a hypothetical cyber risk scenario prepared by the Cyber Risk Management (CyRiM) project for risk management purposes, a ransomware strain that can disrupt more than 600,000 businesses worldwide within 24 ...
Protect WordPress from Cybersecurity Threats

Protect Your WordPress from Cybersecurity Threats

WordPress is among the most famous publishing platforms, running more than 24 percent of all websites globally. WordPress is open source, which means it is visible and discernible to every user—and is ...
Security Boulevard
A Forged “From” Address

A Forged “From” Address

To the left we see part of a malicious email. The author brags about how the From address is the same as the To address. This is supposed to mean that the ...

Catch Me If You Can: The Changing Faces of Malware

The reappearance of malware variants shows how platform criminality is enabling hackers to teach old code new tricks The security industry and authorities need to work together to understand how platforms are ...

How Hackers Exploit Online Games

Legitimate platforms like online gaming services are a breeding ground for hackers, with in-game currencies and micro-transactions putting a target on the gaming industry’s back Online games have also provided a testing ...
Loading...