Locky ransomware

Popularity 1042

One of the latest ransomware variants of this malware is known as Locky. Files stored in PCs infected with Locky is encrypted and renamed with the extension ".locky" (hence the name of this malware). After encrypting files, wallpaper (wallpaper) is changed to an image they are told users that ... Read more ->

UPDATE: the CTB-Locker encrypts the content of such web sites

Popularity 1031

CTB Locker (Locker Bitcoin Curve-Tor), also known as the Critroni, is malicious software, type ransomware, whose aim is to encrypt files stored on the affected system. It was released in mid-July of 2014 and covers all versions of Windows, including Windows XP, Windows Vista, Windows 7 and Wind ... Read more ->

Vulnerabilities of the implementations of the cryptographic of the mobile terminals with iOS and Android

Popularity 1019

A team of researchers coming from the University of Tel Aviv, Techion and the University of Adelaide has found one way that an attacker could steal the encryption keys used to protect the accounts type wallet (wallet): Bitcoin, Apple Pay, and other sensitive services within the Android and iOS opera ... Read more ->

DROWN: the Vulnerability of the HTTPS protocol

Popularity 978

Drown is a critical vulnerability affecting HTTPS and other services that rely on SSL and TLS, two of the essential cryptographic protocols used for communication security over the Internet. Programmes modern client-server protocol that uses TLS encryption. However, due to configuration errors ... Read more ->

Campaign Scam aimed at iPhone users

Popularity 1016

Romanian users of Apple's services are targeted for a specific campaign Scam (Phishing) via the Safari browser. More specifically, the opening Safari, users see a message that are announced that are brought accusations about the fact that they "viewed / stored / distributed pornography prohib ... Read more ->