cybercrime

  1. News

    Cybercrimes Go Unreported More Often Than People Think, Report Finds

    About half of organizations say cybercrime is under-reported at their organizations, even when reporting is required. Continue reading...
  2. News

    TA18-331A: 3ve – Major Online Ad Fraud Operation

    Original release date: November 27, 2018 Systems Affected Microsoft Windows Overview This joint Technical Alert (TA) is the result of analytic efforts between the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI). DHS and FBI are releasing this TA to...
  3. whoosh

    VIDEO Man arrested in connection to suspicious devices

    :usa::up:
  4. News

    TA16-336A: Avalanche (crimeware-as-a-service infrastructure)

    Original release date: December 01, 2016 | Last revised: December 14, 2016 Systems Affected Microsoft Windows Overview “Avalanche” refers to a large global network hosting infrastructure used by cyber criminals to conduct phishing and malware distribution campaigns and money mule schemes...
  5. News

    TA17-181A: Petya Ransomware

    Original release date: July 01, 2017 Systems Affected Microsoft Windows operating systems Overview On June 27, 2017, NCCIC was notified of Petya ransomware events occurring in multiple countries and affecting multiple sectors. Petya ransomware encrypts the master boot records of infected...
  6. News

    Update on Petya malware attacks

    As happened recently with WannaCrypt, we again face a malicious attack in the form of ransomware, Petya. In early reports, there was a lot of conflicting information reported on the attacks, including conflation of unrelated and misleading pieces of data, so Microsoft teams mobilized to...
  7. News

    Security trends & Windows 10

    Cybersecurity threats both new and known, from Advanced Persistent Threats (APT), to the Internet of Things (IoT), to the shortage of cyberworkers, threaten us each day. To help protect ourselves and our customers, we mobilize threat intelligence and machine learning, a mindset of “assume...
  8. pnamajck

    malwarebytes imitation …

    don't get suckered into the imitation software … always go directly to the source … in this case www.malwarebytes.com . yep, another new ransomware variant is making the rounds … trying to pass itself off as legitimate software. supposedly the filename is...
  9. bochane

    No More Ransom Project: Help for Ransomware Victims in The Netherlands

    Police in The Netherlands in cooperation with Europol, Kaspersky and Intel Security, announced a new website with offers help to victims of ransomware and with advice to protect your system against it. Here it is: The No More Ransom Project I hope it helps Henk
  10. Sonic Feathers

    Windows 7 Remove Hack Admin acc.

    Hello, Got hacked April 8 after Android Z3 stolen. Was aware after event, comp was compromised. Changed all Pwords, 2 weeks after changed all Pwords. But see now how they have done things, they didn't write script, enter trojan, key loger (?), nup. All he did was change settings, Administrator...
  11. News

    Dorkbot Botnet: Overview, Impact, and Solutions for Microsoft Windows Users

    Original release date: December 03, 2015 Systems Affected Microsoft Windows Overview Dorkbot is a botnet used to steal online payment, participate in distributed denial-of-service (DDoS) attacks, and deliver other types of malware to victims’ computers. According to Microsoft, the family of...
  12. News

    Australian Government backs free Cryptolocker decryption tool

    Security vendors FireEye and Fox IT have launched a Web tool which allows victims of Cryptolocker Malware attacks to decrypt files without paying ransom to cybercriminals. Cryptolocker is Windows-based ransomware which relies on disguise to infect systems and encrypt files, demanding a payment...
  13. News

    TA14-150A: GameOver Zeus P2P Malware

    Original release date: June 02, 2014 Systems Affected Microsoft Windows 95, 98, Me, 2000, XP, Vista, 7, and 8 Microsoft Server 2003, Server 2008, Server 2008 R2, and Server 2012 Overview GameOver Zeus (GOZ), a peer-to-peer (P2P) variant of the Zeus family of bank credential-stealing malware...
  14. B

    Windows 7 locked out of my computer due to instant bosd

    I recieved a call from and indian man saying he was from windows tech support and told me to check something so i did then i noticed it seemed a little fishy so i googled it and apparently they are cyber criminals so i hang up. Around 5 hours later i get an internet error 'limited access' so i...
  15. News

    TA14-002A: Malware Targeting Point of Sale Systems

    Original release date: January 02, 2014 Systems Affected Point of Sale Systems Overview Point of Sale Systems When consumers purchase goods or services from a retailer, the transaction is processed through what are commonly referred to as Point of Sale (POS) systems. POS systems consist of...
  16. News

    TA13-309A: CryptoLocker Ransomware Infections

    Original release date: November 05, 2013 | Last revised: November 06, 2013 Systems Affected Microsoft Windows systems running Windows 7, Vista, and XP operating systems Overview US-CERT is aware of a malware campaign that surfaced in 2013 and is associated with an increasing number of...
  17. whoosh

    Panda Security hacked by Antisec !

    The message left on the first page hello friends! pandasecurity.com, better known for its shitty ANTIVIRUS WE HAVE BACKDOORED, has earning money working with Law Enforcement to lurk and snitch on anonymous activists. they helped to jail 25 anonymous in different countries and they were actively...
  18. Mike

    VIDEO How to Prevent Online Identity Theft: An Early Look

    A recent look at computer security shows online identity theft scams becoming easy for nefarious individuals who prey on those who lack essential security updates. Anyone experienced in the business need only to look at the serious manner of many, many businesses still running Windows XP without...
  19. JMH

    Windows 7 The cyber crime tide is turning

    Link Removed
  20. JMH

    Windows 7 Why Hackers Write Computer Viruses

    Maximum PC | Why Hackers Write Computer Viruses
Back
Top