Credit to Author: Jörg Schindler| Date: Fri, 17 Nov 2017 11:17:03 +0000
Ransomware hat Unternehmen und Privatanwender in diesem Jahr auffällig zugesetzt. SophosLabs kommt nach seiner Analyse von Daten aus April bis Oktober 2017 zur Prognose, dass auch das nächste Jahr von Ransomware und Ransomware as a Service (RaaS) inkl. Do-it-yourself-Bausätzen geprägt sein wird. Neben Windows müssen sich zukünftig allerdings auch Linux, Mac und Android User wappnen. […]<img alt=”” border=”0″ src=”https://pixel.wp.com/b.gif?host=news.sophos.com&blog=834173&post=44132&subd=sophos&ref=&feed=1″ width=”1″ height=”1″ /><img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/bn9hDukwQNM” height=”1″ width=”1″ alt=””/>
Credit to Author: Tiziana Carboni| Date: Tue, 07 Nov 2017 14:15:42 +0000
Se Windows è stato il sistema operativo più attaccato dal ransomware nel 2017, nemmeno Android, Linux e MacOS sono stati risparmiati. Sono due le famiglie di ransomware responsabili dell’89,5% di tutti gli attacchi intercettati sui computer dei clienti Sophos in tutto il mondo.<img alt=”” border=”0″ src=”https://pixel.wp.com/b.gif?host=news.sophos.com&blog=834173&post=43983&subd=sophos&ref=&feed=1″ width=”1″ height=”1″ /><img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/vGmiyRZG0fI” height=”1″ width=”1″ alt=””/>
Credit to Author: Malwarebytes Labs| Date: Mon, 06 Nov 2017 18:00:03 +0000
Learn what happened in the world of security during the week of October 30 through November 5. Data breaches, reports, vulnerabilities, and a look at the scariest malware monsters.
Credit to Author: Bill Brenner| Date: Thu, 02 Nov 2017 10:00:31 +0000
SophosLabs looked at the most prolific ransomware variants. And, we offer you the tools to better defend against them.<img alt=”” border=”0″ src=”https://pixel.wp.com/b.gif?host=news.sophos.com&blog=834173&post=43824&subd=sophos&ref=&feed=1″ width=”1″ height=”1″ /><img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/KUjPWMy0Kt8″ height=”1″ width=”1″ alt=””/>
Credit to Author: Bill Brenner| Date: Thu, 02 Nov 2017 10:00:31 +0000
SophosLabs looked at the most prolific ransomware variants. And, we offer you the tools to better defend against them.<img alt=”” border=”0″ src=”https://pixel.wp.com/b.gif?host=news.sophos.com&blog=834173&post=43824&subd=sophos&ref=&feed=1″ width=”1″ height=”1″ /><img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/KUjPWMy0Kt8″ height=”1″ width=”1″ alt=””/>
Credit to Author: Bill Brenner| Date: Thu, 02 Nov 2017 10:00:02 +0000
Sophos principal research scientist Chester Wisniewski talks about trends covered in the 2018 Malware Forecast.<img alt=”” border=”0″ src=”https://pixel.wp.com/b.gif?host=news.sophos.com&blog=834173&post=43841&subd=sophos&ref=&feed=1″ width=”1″ height=”1″ /><img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/VDR2U1iuXl0″ height=”1″ width=”1″ alt=””/>
In early August 2017, FBI agents in Las Vegas arrested 23-year-old U.K. resident Marcus Hutchins on suspicion of authoring and/or selling “Kronos,” a strain of malware designed to steal online banking credentials. Hutchins was virtually unknown to most in the security community until May 2017, when a British newspaper revealed him as the “accidental hero” who inadvertently halted the global spread of WannaCry, a ransomware contagion that had taken the world by storm just days before. Relatively few knew it before his arrest, but Hutchins for many years authored the popular cybersecurity blog MalwareTech. When this fact became more widely known — combined with his hero status for halting Wannacry — a great many MalwareTech readers quickly leapt to his defense to denounce his arrest. They reasoned that the government was overstepping on flimsy evidence, noting that Hutchins has worked tirelessly to expose cybercriminals and their malicious tools. To date, some 226 supporters have donated more than $14,000 to his defense fund. At first, I did not believe the charges against Hutchins would hold up under scrutiny. But as I began to dig deeper into the history tied to dozens of hacker forum pseudonyms, email addresses and domains he apparently used over the past decade, a very different picture began to emerge. In this post, I will attempt to describe and illustrate more than three weeks’ worth of connecting the dots from what appear to be Hutchins’ earliest hacker forum accounts to his real-life identity. The clues suggest that Hutchins began developing and selling malware in his mid-teens — only to later develop a change of heart and earnestly endeavor to leave that part of his life squarely in the rearview mirror.