A new strain of ransomware is on the loose! Watch out!
Our colleagues at PandaLabs have detected a new strain of ransomware: Trj/RansomCrypt.B. Known as CTB-Locker, what is different about this example is that if you pay, you can access all the locked...
View ArticleYet another ransomware variant!
Recently we caught what seems to be a new ransomware variant in our nets. The mail contained a file called “Transferencia devuelta pago erroneo” (translated: “Transfer back erroneous payment”) with the...
View ArticleSkype worm reloaded
Skype worms are not exactly new anymore (unfortunately). Scenario is simply: someone on your friends list got infected and is now sending you a link to a ‘funny image’ or pictures of you. In this...
View ArticleNew threats for Android phones, how do they work? Beware of your battery!
When buying a smartphone one of the first things we do is choosing an unlock pattern, trusting that by doing this our WhatsApp conversations will be protected from our nosy surroundings. If you are...
View ArticleCyber safety: one of the major companies concerns
I’m sure you have read about Sony’s latest leaks, the cyberattacks to Medias like The New York Times and the chaos created when cybercriminals paralyzed some banks payment networks. Nevertheless there...
View ArticleThe Pirate Bay has grown clones loaded with malware. Beware!
A few weeks ago, a court in Madrid issued a statement to block access to the home page of ‘The Pirate Bay’ and all associated domains. The court based on the premise of the Spanish “Ley Sinde” to...
View ArticleThe famous reversible USB could be a ‘malware’ loophole for your devices
Wouldn’t it be nice not having to turn around several times your USB before connecting it to the computer? You won’t remember that feeling, very soon. The new connector Type-C USB, better known as...
View ArticleVirus in the name of WhatsApp! Now via email!
Profits are not the only thing brought by the voice calls in WhatsApp. We are sure that some of you are also worried about this. According to RedesZone, this new service has reactivated, and made more...
View Article‘Macro virus’ are back: threats of the past that will haunt us in the future
Maybe you don’t remember, but in 1999 Melissa was an extremely popular name within cybersecurity. This cyber virus infected more than 100.000 computers in only three days. It was a macro type malware,...
View ArticleCryptoLocker: What Is and How to Avoid it
CryptoLocker is a new family of ransomware whose business model (yes, malware is a business to some!) is based on extorting money from users. This continues the trend started by another infamous piece...
View ArticleMore than 50% of malware for Android is aimed at stealing from you. Keep an...
With the barrage of news about Hacking Team, the massive cyber espionage by governments, and the US intelligence raids, it might seem that cybercriminals are taking a different route compared to your...
View ArticleA problem for Human Resources – some CVs can hold your computer at ransom
Just like sending greeting cards by post, physically presenting your CV for a prospective job offer is becoming extinct. The digital world in which we live has rendered the act of traditional post as...
View ArticlePandaLabs detected more than 21 million new threats during the second quarter...
PandaLabs, the laboratory set up by Panda Security, has published its quarterly report where it shows the latest statistics on malware and cyberattacks that have been at the forefront of this year’s...
View ArticleXcodeGhost: What it Is and How to Avoid it. The Sheen Comes off Apple’s...
In what is a timely reminder that even the largest, and seemingly controlled, companies can face a cyberattack, Apple revealed that its Chinese App Store had been attacked by malware. In what is...
View Article10 Tips to Avoid Viruses on Halloween
Halloween is one of the most celebrated holidays, and cybercriminals always want to be part of it. As we get closer to Halloween, hackers take advantage of the most popular Hollywood titles to launch...
View ArticleThe Most Famous Virus in History: Friday the 13th
Let’s keep remembering and recalling more viruses that have caused the biggest headaches for users. The virus Jerusalem, also known as Friday the 13th, was created in Israel in 1988 to celebrate the...
View Article2015, the year of Cryptolocker
At the end of 2013 the first signs of what would eventually become one of the most lucrative attacks for cybercriminals were spotted. Cryptolocker is the name of the most popular family of ransomware,...
View ArticleAll you need to know about the worrying popularity of Malvertising
Every morning, without fail, you log onto your computer and check your emails, read the news, and have a look at your social media accounts. While you do this it is likely that you’ll come across a few...
View ArticleCryptolocker ‘Locky’. How it works
We don’t know if you’ve heard of the new Cryptolocker which is called ‘Locky’… It works as follows: It arrives by mail and the attachment is a Word document with macros. Upon opening the document the...
View ArticleLocky malware report
The main objective of the Locky malware is to encrypt certain system files and network drives to coerce the affected user into paying a ransom to recover them. It renames all encrypted document as...
View Article
More Pages to Explore .....