Hackers about hacking techniques in our IT Security Magazine

malware

23

Apr

CryptoLocker Ransomware: The Crime That Can Be Prevented

CryptoLocker Ransomware: The Crime That Can Be Prevented by Dr. Rebecca Wynn This week I received notification from a legal …

Read More

31

May

ZeroNights Conference in Moscow

ZeroNights is an international conference dedicated to the practical side of information security. ZeroNights shows new attack methods and threats, …

Read More

8

Dec

Fake Verizon email with malicious ZIP in circulation

Microsoft is warning users about a fake Verizon notification which is carrying a Trojan. The email appears to come from …

Read More

29

Nov

Advanced SystemCare 5 Released!

Advanced SystemCare 5: IObit Debuts The New Release Of Its Flagship Software Suite. Advanced SystemCare is one of the most …

Read More

17

Nov

The QR code mobile malware and phishing threat

QR codes (sometimes referred to as ‘tags’) which is an abbreviation for ‘Quick Response’ allows mobile users to use a …

Read More

10

Nov

Critical TCP/IP flaw fixed in November Patch Tuesday release

Microsoft released their November Patch Tuesday on the 8th November which also included a critical TCP/IP fix. The TCP/IP component …

Read More

4

Nov

Win32k TrueType font-parsing engine vulnerability

Microsoft issued an advisory this week on the TrueType font-parsing vulnerability. The flaw affects every supported version of Windows including …

Read More

4

Nov

Malware using Windows Task Scheduler

Windows Task Scheduler (AT.exe) is well known to us all, but the Stuxnet worm has introduced the Zlob variants and …

Read More

27

Oct

Emma Watson Adobe Flash Trojan dropper in circulation

Emma Watson Adobe Flash malware in circulation. The latest of these videos purportedly features popular English actress Emma Watson and …

Read More

20

Oct

Flashback Trojan targets Apple Mac OS X Lion

A new variant of a nasty Apple Mac Trojan has been found in the wild. Picking up where its predecessor …

Read More