Category: Uncategorized


The National Security Agency has linked the North Korean government to the creation of the WannaCry computer worm that affected more than 300,000 people in some 150 countries last month, according to U.S. intelligence officials.

Continue reading

Many Mac OS users might assume that their computer is exempt from things like ransomware attacks and think that their system is somehow essentially “secure.” It is true that it’s less likely for a Mac OS user to be attacked or infected by malware than a Windows user, but this has nothing to do with the level of vulnerability in the operating system. It is largely caused by the fact that over 90% of personal computers run on Microsoft Windows and only around 6% on Apple Mac OS. Continue reading

Two Tickets as Bait

Over the previous weekend, social networks were hit with a wave of posts that falsely claimed that major airlines were giving away tickets for free. Users from all over the world became involved in this: they published posts that mentioned Emirates, Air France, Aeroflot, S7 Airline, Eva Air, Turkish Airlines, Air Asia, Air India, and other companies. We cannot rule out that similar posts mentioning other brands may appear in the nearest future as well. Continue reading

Figure 2. This method bypasses the provider’s anti-bot

Early last month we discussed a new Internet of Things (IoT) botnet called Persirai (detected by Trend Micro as ELF_PERSIRAI.A), which targets over 1000 Internet Protocol (IP) camera models. Currently, through Shodan and our own research, we see that 64% of tracked IP cameras with custom http servers are infected with Persirai. But, because these cameras are such common targets, there is some competition between malware. Continue reading

Server Message Block (SMB) is the transport protocol used by Windows machines for a wide variety of purposes such as file sharing, printer sharing, and access to remote Windows services. SMB operates over TCP ports 139 and 445. In April 2017, Shadow Brokers released an SMB vulnerability named “EternalBlue,” which was part of the Microsoft security bulletin MS17-010. Continue reading

Cloak & Dagger

Cloak & Dagger is a new class of potential attacks affecting Android devices. These attacks allow a malicious app to completely control the UI feedback loop and take over the device — without giving the user a chance to notice the malicious activity. These attacks only require two permissions that, in case the app is installed from the Play Store, the user does not need to explicitly grant and for which she is not even notified.  Continue reading

Q. What is being difference between ransom and sale?

A. Sale is buy or no buy, no bad things happen if no buy. Ransom is buy or bad things happen to you. Yes? Continue reading

With only 24 hours to build an app, it’s never easy to come up with a viable idea, nevermind build one that involves training a machine learning algorithm. Yet that’s exactly what a team of four friends accomplished this weekend at the annual TechCrunch Disrupt New York Hackathon. Continue reading

Hospitals and other institutions across Europe, Asia and beyond were simultaneously struck on Friday by a cyberattack that locked their computer systems and demanded a ransom to restore access, leading to chaos in emergency rooms, in doctors’ offices and aboard ambulances. Continue reading

Here’s Everything We Know About The Mysterious Air Force Plane That Just Landed After 2 Years In Space Featured

The US military’s X-37B space plane landed at NASA’s Kennedy Space Center on Sunday, ending its record-breaking 718-day orbit with a sonic boom during its first landing in Florida. Continue reading