Category Archives: Latest News

Cyber Experts Reveals New Distribution Channels of Ursnif Banking Trojan

Security analysts have managed to identify a new phishing campaign which is used to spread Ursnif Banking Trojan in order to target various computer users all around the world. Cyber offenders adopted a deceptive technique for the distribution of banking Trojan via spam email campaign which contains a malicious document and mislead the web surfers to download an executable file of Ursnif Trojan. Although, there are two main factors identified by the security researchers that are used for the malware’s distribution. In this distribution channel, spam botnet is used to send malicious emails, and the hacked web servers to host the Trojan. According to the security experts, the spam botnet is focused on distributing the Ursnif Banking Trojan to affect the computers in Japan, Germany, Australia, Spain and Poland.

Ursnif Banking Trojan

Continue reading

Posted in Latest News. Tagged with , , , , , , , , , , , , , , , .

Researchers Reports: Gmail Carries Spoofed Messages Without Any Notice


These days, Gmail is one of the most popular electronic communication media through which we can easily communicate with other people. It does not only help to communicate but also to store document and professional purposes. As we all are very familiar with its features and behavior. But it has some pretty strong spam filters that is one of its strong points. Google manage to keep out most of the spam emails or messages from hitting your inbox, still, it cannot keep out everything especially when it arrives from a spoofed Continue reading

Posted in Latest News. Tagged with , .

Gmail Stops Supporting Older Versions of Chrome : Affected Windows XP & Vista Users

It’s Time To Update Older Versions of Chrome or Windows OS?

Google doesn’t generally announce whenever it discontinues the support for an older versions of Chrome browser. However, changing its tradition, the search giant of Mountain View posted that the users of Chrome version 53 and earlier would be rerouted to the primary HTML version of Gmail starting from the month of December 2017. Most often, the users do not care which version of Google Chrome they’re using. Although, the silent update mechanism ensures that most of the Chrome users are always on the latest version that are available for the browser. Instead, there can be various reasons why some users cannot upgrade their browser. Among all of them, the older OS version being one of the most probable reason for that.

older versions of Chrome

Continue reading

Posted in Latest News. Tagged with , , , , , , , , .

VirLocker Ransomware Makes a Comeback with a Virulent Version

VirLocker Ransomware is in no way new and the threat has been making a mess of victims’ computers for quite a few years now. This ransomware was the very first example of popular polymorphic ransomware virus and it left no expense of misery onto its victimized users. Of course, it can be propagated just like any other cyber infections distributed by their developers. Although, this malware has a trick up its sleeve whenever it comes to infecting other system users. Just because every files stored onto the infected machine that VirLocker Ransomware encrypts becomes VirLocker threat itself. So, many affected machine users will accidentally send infected version of a file to their friends and colleagues. Even more, the backup copies become infected and even installed applications and exe’ files are not safe.

VirLocker Ransomware

Most important, when getting infected with VirLocker Ransomware, users can no longer trust a single file stored on their affected PCs. This brings an issue while attempting to clean up the system, because nothing can be trusted at all and every install apps that you use is become dirty. Even attempting to download and install a security tool to help you can prove the problem, because the ransomware will attempt to infect each and every new file before it gets opened if the malware is running onto the machine. In case, if you find yourself infected with the new variant of this nasty computer threat, then do not attempt to eliminate it yet! In this security article, you will not only get the brief description on this ransomware, but also get the detailed information on how to restore files encoded by VirLocker Ransomware.

Continue reading

Posted in Latest News. Tagged with , , , , , , .

BSOD Becomes ‘Green Screen of Death’ For Windows 10 Testers

Green Screen of Death

First there was a Black Screen of Death, where a Windows 3.x system would displays a screen with white text onto the black background when it crashed. Then after, around a time of Windows NT, the Microsoft switched to a Blue Screen of Death error, where the displayed screen of crashed PC contains a white text on a blue background. These errors block the screens that have been an important part of the Windows culture since forever. Now, the Microsoft is ready to take yet another measure step in its transition from old to new. Although, it seems that the newest and an unofficial Windows insider preview version of Win 10 is using a new GSOD (Green Screen of Death), according to MSPU reports.

Continue reading

Posted in Latest News. Tagged with , , , , , , .

Spora Ransomware : Works Offline & Equipped with Sophisticated Payment Portal


Spora Ransomware is an advanced encryption virus which shows that ransom developers performing attacks professionally. It includes an extensive ransom notification which support for multiple languages, free decryption of two files, double encryption and a victim-friendly payment website. Spora comes from the Russian word ‘Spore’, which relies on bogus invoice emails for its distribution. These emails bear ZIP files which contains HTA (HTML Application) files as an attachment.

However, users might not realize it. This is just because the HTA files uses double extensions such as ‘DOC.HTA’ and ‘PDF.HTA’, which means that users might only notice the first extension. Clicking on those HTA files launches Spora Ransomware. According to the malware researchers, when a user runs HTA files, then it will extract a malicious JavaScript file named ‘close.js’ onto the %Temp% folder, which then extract an executable file onto the same folder and executes it. The executable generally uses a random generated name. This executable file is the main encryptor and will begin to encode the files and data stored on the infected system.

Continue reading

Posted in Latest News. Tagged with , , , , , .

KillDisk Ransomware Now Targeting Linux and Prohibiting Boot-Up using Faulty Encryption

KillDisk Ransomware

A new Linux variant of KillDisk Ransomware has been discovered by researchers, including potential of posing huge harm to the entire computer system. According to security experts, this infection itself is a new addition to the KillDisk disk wiper malware family which was previously only utilized to ruin companies via randomly deleting data and altering files. The Linux variant of KillDisk Ransomware was firstly discovered by ESET, just a week after researchers from CyberX detected the foremost KillDisk versions including ransomware features.

According to CyberX’s researchers, it’s first version was compatible only with the Windows OS. Now though being a member of the perilous ransomware infection, KillDisk Ransomware also encrypts thesystem’s crucial files after getting complete perforation inside it but researchers has reported it’s working algorithm completely distinct from each other on Windows and Linux versions of OS respectively. According to researches, KillDisk Ransomware do not save the encryption key anywhere on the disk or online on Linux OS.

Continue reading

Posted in Latest News.

Cerber Ransomware Updated Not to Delete Shadow Volume Copies But Office Docs

Cerber ransomware is yet again in news and this time for a specific reason. The newly identified and the recent versions of this ransomware behaves somewhat different from the previous one. The biggest change in the recently detected version of Cerber Ransomware is that it does not delete the shadow volume copies, instead, it is targeting and prioritizing specific folders only. This change has been spotted only in the recent version but it does not mean that shadow volume won’t be targeted in the future version. This discovery mainly comes via the Microsoft Malware Protection Center along with the Heimdal Security.

Continue reading

Posted in Latest News. Tagged with , , .

Newly Unleashed Alice Malware Targets ATMs to Spit Out Cash


Unlike RIPPER and SUCEFUL ATM malware, Alice Malware isn’t controlled via ATM’s PIN pad (ATM Keyboard) The malicious authors of Alice Malware haven’t focused on the coding that enables communication between malware server and ATM (Automated Teller Machine) through ATM key pad instead they have included an unique module that dishes out cash of ATM. Furthermore, it was highlighted that Authors of Alice Malware aren’t as experienced as other malware because their concept of collecting and selling payment card data online is really too much time consuming and poses risk of getting caught by cyber crime branch or FBI.

Continue reading

Posted in Latest News. Tagged with , .

Ransomware Attacks Increased to Manifold Targeting Businesses in 2016


Kaspersky Lab has unleashed a report that claims number of cases of sudden increase in Ransomware attacks lately. Various Companies have to bear the brunt due to infamous ransomware attack which has significantly gone up since January to September 2016. What is most alarming, is the fact that this is not the end of the road and count down is still on. If reports are to be believed it is most baffling as ransomware is targeting one in every five businesses worldwide and the attack rate of ransomware that makes the count and has surpassed previous records of one every two minutes to one every forty seconds now. For the normal computer users, the attack rate was even worse because the rate crossed one attack in every 10 seconds in the month of September, 2016.

Continue reading

Posted in Latest News.