It’s that time of the year when the information security industry takes part in its annual tradition: coming up with cybercrime predictions and trends for the next 12 months.
The post ESET predictions and trends for cybercrime in 2016 appeared first on We Live Security.
Some of the good things in store for those attending Virus Bulletin 2015.
The post Virus Bulletin 2015 appeared first on We Live Security.
Not only is Brazil one of the most populated countries in the world, but it is also one of the countries with the highest percentage of Internet users using online banking. The latest research from ESET is now available: CPL Malware in Brazil.
The post CPL Malware in Brazil: somewhere between banking trojans and malicious emails appeared first on We Live Security.
If you have recently received an unexpected email with a ZIP file attached, it could be a threat attempting to steal your banking login credentials. Its name is Waski and is detected by ESET as Win32/TrojanDownloader.Waski.
The post Waski downloader spreads banker Trojan targeting users worldwide appeared first on We Live Security.
Win32/VirLock is ransomware that locks victims’ screens but also acts as parasitic virus, infecting existing files on their computers. The virus is also polymorphic, which makes it an interesting piece of malware to analyze. This is the first time such combination of malware features has been observed.
The post Win32/Virlock: First Self-Reproducing Ransomware is also a Shape Shifter appeared first on We Live Security.
As regular readers will know, every year we publish our predictions on cybercrime attacks for the year ahead. Well, our South American research team has spent the last few weeks putting together our predictions for 2015.
The post Cybercrime Trends & Predictions for 2015 appeared first on We Live Security.
The Sednit espionage group, also known as the Sofacy group, APT28 or âFancy Bearâ, has been targeting various institutions for many years. We recently discovered a component the group employed to reach physically isolated computer networks — âair-gappedâ networks — and exfiltrate sensitive files from them through removable drives.
The post Sednit Espionage Group Attacking Air-Gapped Networks appeared first on We Live Security.
Software and Security Information