The general concept of ransomware is that the victim is forced into paying a ransom in order to gain access to their computer or virtual property.
Over the past 2 years, various companies have developed Anti-Ransomware technologies, designed to stop the vast amount of ransomware variants doing harm on a user's computer. These programs usually work by classifying applications based on behavioural analysis, system activity, disk activity as well as calling specific functions that encrypt data.
In early 2016 security researchers across the world noticed an increase in ransomware. In fact, it was an estimated 200-400% rise in the number of ransomware infections. Such ransomware families included TeslaCrypt, Cerber, Jigsaw and many others that were propagated in many different forms - Malvertising, File-Sharing and compromised websites. For a lot of 2016, … Continue reading My Summary of Cyber Security in 2016
On Sunday 10th July 2016 at 03:00 GMT, Kaspersky Internet Security for Android detected 2 pieces of malware on my device within a pirated version of Minecraft Pocket Edition. (Yes I pirate games if I have to) 10 minutes later, the scan finished and KIS stated that it had found one malicious app running in … Continue reading How I dealt with the Ztorg Android Malware
Many people use adblock (Including me) and I noticed that a lot of businesses are stating that adblockers are bad and people should not use them. Don't listen to it. Adblockers provide an important role in security for blocking compromised adverts, malvertising, clickjacking and malicious web resources, which will infect users with all sorts of … Continue reading Adblock can be good for you
Malware can spread in many different ways. This blog will explain most of the different methods and how they are used. The World Wide Web The World Wide Web is used in a number of ways to spread malware and infect vulnerable people. One of the most common techniques is to trick the user into … Continue reading The Methods of Spreading Malware
A few people asked me to do this, so here it is! 🙂 Trojans Trojans are malicious software that are usually designed to steal confidential data from a victim. There are different types of trojan, each designed to perform a specific job. Usually they come with a keylogger to record every key pressed on a … Continue reading The Different Types of Malware
WordPress was comprimised by the Nuetrino Exploit Kit. This exploit kit installs backdoors on WordPress sites running older versions of the content management system (4.2 and older). It then redirects the victim through a series of iFrames to a landing page hosting a Flash exploit. The exploit targets users running Internet Explorer and the victims … Continue reading WordPress was comprimised!