Archive for April, 2016

The nuclear power plant of Gundremmingen is pictured on March 11, 2012.    REUTERS/Michaela Rehle

A nuclear power plant in Germany has been found to be infected with computer viruses, but they appear not to have posed a threat to the facility’s operations because it is isolated from the Internet, the station’s operator said on Tuesday. Continue reading

Talos posted a blog, September 2015, which aimed to identify how often seemingly benign software can be rightly condemned for being a piece of malware. With this in mind, this blog presents an interesting piece of “software” which we felt deserved additional information disclosure. This software exhibits several questionable behaviors including: Continue reading

Malware writers have always sought to develop feature-rich, easy to use tools that are also somewhat hard to detect via both host- and network-based detection systems.  For many years, one of the go-to families of malware used by both less-skilled and advanced actors has been the Poison Ivy (aka PIVY) RAT.  Continue reading

Decrypt CryptXXX

The common user experience when it comes to ransomware looks like this: you open a website then accidentally download and install a piece of software. You might even not notice that you’ve done that. For some time nothing happens and suddenly you see a notification that all your files are encrypted by a Trojan that wants money to return them back. You check to see if it’s true and see: all your files refuse to open. You also see that they are updated with the ominous .crypt extension. Continue reading


Since Windows 7 is the most popular operating system (OS) among PCs, many malware choose to target it. Malware often do so by using Windows’ very own artifacts.  During 2015, Windows artifacts were increasingly abused for malicious operations. For attackers, this is an effective technique, since these artifacts are always present in a Windows environment. Processes that masquerade as valid Microsoft processes raise less suspicion and are likely to be overlooked by ordinary users. Continue reading


Here on Centauri Dreams we often discuss interstellar flight in a long-term context. Will humans ever travel to another star? I’ve stated my view that if this happens, it will probably take several hundred years before we develop the necessary energy resources to make such a mission fit within the constraints of the world’s economy. Continue reading

Huawei GR5 Review

Huawei has released new and impressive smartphones for the high-end category in the past few months namely, the Huawei P9, Huawei Mate S, and the Nexus 6P. But for those looking at the mid-range space, the company is offering the Huawei GR5. Check out what this phone has to offer in the our review below. Continue reading


Cyber threats have dramatically developed throughout the years. From simple worms to viruses, and finally to advanced Trojan horses and malware. But the forms of these threats are not the only things that have evolved. Attacks are targeting a wider range of platforms. They have moved from the PC to the Mobile world, and are beginning to target IoT connected devices and cars. Continue reading

The evolution of Brazilian Malware

Brazilian malware continues to evolve day by day, making it increasingly sophisticated. If you want to know how the various malicious programs work nowadays, you can jump to the corresponding section here. Meanwhile, before that, we would like to show how the techniques used by Brazilian cybercriminals have changed, becoming more advanced and increasingly complex. Continue reading


News about Badlock vulnerability affecting Windows computers and Samba servers started showing up on Twitter and media around three weeks ago. The site badlock[.]org was registered on March 11 according to WHOIS. There has been a lot of guessing and speculation around this vulnerability. It’s time for reality check: just how bad actually is Badlock? Continue reading