Menu

Blog

Home/Blog
10 01, 2017

From Darknet with Love: Meet Spora Ransomware

By |January 10th, 2017|Blog|Comments Off on From Darknet with Love: Meet Spora Ransomware

Ransomware has been a growing threat, with new families cropping up every week. Emsisoft researchers are often involved in the discovery and analysis of new threats, and this ransomware is no different. Originally spotted on ID-Ransomware earlier today, it caught our attention due to a few unique features and the high level of professionalism in both implementation [...]

2 12, 2016

Gooligan Android malware breaches 1 million Google Play accounts

By |December 2nd, 2016|Blog|Comments Off on Gooligan Android malware breaches 1 million Google Play accounts

13,000 devices are infected with Gooligan every day A new malware attack is hitting Android devices at an alarming rate. This attack is the largest ever breach of Google accounts, according to Check Point, a security research firm that is working with Google to monitor and document the outbreak. The malware attack hijacks phones using [...]

17 11, 2016

Microsoft calling? Mind the tech support scammer!

By |November 17th, 2016|Blog|Comments Off on Microsoft calling? Mind the tech support scammer!

After a long day, there is nothing like sitting down at your computer with a cup of tea to catch up on the news online. But what would you do if you were faced with a pop-up telling you that your computer has a virus and that ‘tech support’ is conveniently letting you know? The [...]

16 10, 2016

30 seconds and 50 dollars is all it takes to steal your PC login

By |October 16th, 2016|Blog|Comments Off on 30 seconds and 50 dollars is all it takes to steal your PC login

Imagine you’ve been at work for a few hours. It’s time to get up, grab a coffee and some morning tea. You’ll only be away from your desk for ten minutes so you know it will be easier to just hit the lock screen on your workstation than to completely log out and then log [...]

12 10, 2016

Malware in sex toys: How private is your playtime?

By |October 12th, 2016|Blog|Comments Off on Malware in sex toys: How private is your playtime?

In a time where fridges self-monitor their own food levels and cars can drive themselves, it was inevitable that the Internet of Things would catch up with the sex toy industry. Our playthings can now be controlled by an app and that can be paired to another person’s phone from wherever in the world they happen [...]

2 10, 2016

No honour among thieves: hackers who hack each other

By |October 2nd, 2016|Blog|Comments Off on No honour among thieves: hackers who hack each other

In ransomware, as in any profitable business, there is a constant struggle to compete in the marketplace. Ransomware, the strain of malware which crypto locks a victim’s hard drive until the developer of the malware is paid, is a highly lucrative – and illegal- income earner for its authors. The strategy is so successful that [...]

23 09, 2016

Yahoo hack hits half a billion users

By |September 23rd, 2016|Blog|Comments Off on Yahoo hack hits half a billion users

Yahoo announces that data from as many as 500 million user accounts were stolen in a breach during 2014. The data breach poses many problems for Yahoo CEO Marissa Mayer as she tries to close a $4.8bn sale to Verizon Communication who were only made aware of the leak two days ago. With the deal not set to close [...]

22 09, 2016

Are all hackers criminals?

By |September 22nd, 2016|Blog|Comments Off on Are all hackers criminals?

Not all hackers are created equal. The terms ‘hacker’ and ‘cyber criminal’ seem to be used interchangeably in online media which is both misleading and reductive. A cybercriminal uses online means to profit from illegal activity regardless of the cost to its many victims. Hacker is a blanket term that doesn’t allow for much differentiation [...]

22 09, 2016

How to identify your ransomware infection to find the right decrypter tool

By |September 22nd, 2016|Blog|Comments Off on How to identify your ransomware infection to find the right decrypter tool

How would you feel if you opened your computer to find it had been locked with a ransom note demanding cash immediately? Ransomware is the most common online threat of 2016, making up a huge percentage of today’s active threats. It has turned out to be one of the easiest and highest income earners for attackers. All [...]

2 09, 2016

Fabiansomware: when hackers lose it

By |September 2nd, 2016|Blog|Comments Off on Fabiansomware: when hackers lose it

Cybercrime has existed for as long as the internet has. However, 2016 has well and truly been the year of ransomware. New ransomware families are popping up weekly and the Emsisoft Malware Lab battles them daily on the frontline. As a result, our lab is often at the receiving end of hate from authors of [...]