Jun 26, 2019

Riviera Beach Ransomware Attack – Costs $600,000 USD to Recover Files


Hackers are taking cities hostage. Although cybersecurity experts suggest not giving in and not paying ransoms, a city in Florida is trying to follow the demand for blackmail attacks, hoping to get the data back.

After Riviera Beach’s city network was attacked ransomware, all of the data was locked with encryption keys, forcing the city council to vote to decide whether to pay 600,000 US dollars in bitcoins to hackers. Read the rest of this post »

Published by Emerson L. Sullivan on June 26, 2019 6:57 am

Jun 24, 2019

Echobot, New Variant of the Mirai Botnet Appears


Mirai is a terrible IoT botnet that has caused headaches for DDos attacks worldwide. Now Mirai’s variant seems to have emerged. According to security researchers, it not only uses Mirai’s similar evolution strategy, but also seems to be based on the Mirai architecture, and its attack power is greatly increased. Read the rest of this post »

Published by Emerson L. Sullivan on June 24, 2019 3:20 am

Jun 20, 2019

Facebook issued a white paper officially announced the cryptocurrency Libra


On the afternoon of June 18th, Facebook Libra officially launched the Libra white paper on cryptocurrency, and announced that Libra’s mission is to build simple, borderless currencies and financial infrastructure for billions of people.

According to a white paper published by Facebook, Libra will be built on a secure, scalable and reliable blockchain. It will be governed by an independent Libra association whose mission is to promote the development of this financial ecosystem. Libra is empowered to intrinsic value Backed by asset reserves. Read the rest of this post »

Published by Emerson L. Sullivan on June 20, 2019 2:02 am and last modified on June 20, 2019 6:32 am.

Jun 13, 2019

Code signing attacks could be next big Threat for Enterprises


Though professional safety personnel generally understand that code-signing attacks pose a threat to the enterprise, they currently have not taken appropriate measures to protect enterprise from attacks. If the code signing keys and certificates that acts as the identity of machine fall into the hands of the attacker, they would undoubtedly cause great damage. Read the rest of this post »

Published by Emerson L. Sullivan on June 13, 2019 2:30 am and last modified on June 13, 2019 2:32 am.

Jun 10, 2019

Clone Crypto Trading Websites have been Used by new Malware Campaign to Spread Trojans


The Cryptohopper platform, which mainly provides automated cryptocurrency trading services, has recently found a high imitation version. In addition to the different URLs, the clone of the Cryptohopper platform uses the same trademarks and layouts as the official website of Cryptohopper, which is not harmful. The bad thing is that an executable file will be automatically downloaded once the Trojan is triggered. Although there is a trademark of Cryptohopper, it is actually a Vidar Trojan. Read the rest of this post »

Published by Emerson L. Sullivan on June 10, 2019 3:35 am and last modified on June 10, 2019 3:39 am.

Jun 6, 2019

Microsoft Azure Cloud Service is used to host malware and control up to 90 computers


AppRiver Security found that Azure Cloud Services still has security issues from phishing templates to malware and command and control services. Research found that its root cause is in Microsoft’s Azure infrastructure. Read the rest of this post »

Published by Emerson L. Sullivan on June 6, 2019 2:26 am

Jun 3, 2019

IT Giants Joined Forces to Oppose British Intelligence Agencies’ Interception of Encrypted Phone Calls


Apple, Microsoft, Google and other IT giants jointly announced a public letter on May 30, condemning the British intelligence agency GCHQ’s plan to monitor encrypted content announced last year, which could pose a threat to personal privacy and network security. Read the rest of this post »

Published by Emerson L. Sullivan on June 3, 2019 2:45 am

May 30, 2019

Decryptor Released for GetCrypt Ransomware


A new ransomware called GetCrypt has been detected. It uses the RigEK exploit tool to spread attacks on users when they visit foreign websites, and encrypts computer files to modify the user’s desktop ransom. Read the rest of this post »

Published by Emerson L. Sullivan on May 30, 2019 1:40 am

May 27, 2019

Unpatched Apple macOS Vulnerability Lets Malicious Apps Run


Security researchers have found an unpatched vulnerability that can completely bypass macOS Gatekeeper security feature to run malicious code. You should watch out for this vulnerability when running applications on your Mac. This vulnerability was first informed by Apple on February 22. However, the latest macOS update hasn’t fixed the vulnerability even though it was supposed to. Read the rest of this post »

Published by Emerson L. Sullivan on May 27, 2019 2:49 am and last modified on May 27, 2019 2:49 am.

May 24, 2019

Bug-Hunter Reveals another “Make Me Mdmin” Windows 10 Zero-Day


A security researcher, nicknamed SandboxEscaper, announced the fifth zero-day vulnerability since August last year. The new vulnerability exists in Windows 10’s Task Scheduler and will allow local hackers to extend general privileges to administrative privileges. Read the rest of this post »

Published by Emerson L. Sullivan on May 24, 2019 1:35 am and last modified on May 24, 2019 1:36 am.

Problems with your PC, Mac or mobile device?

Live Chat Now

Thanks for using YooCare Services!

Here're some of the support team members who are passionate about their works and support our customers 24/7.

As Seen On