Sysg.exe Coin Miner Virus – What Is It + How to Remove It

This article has been created in order to explain what exactly is the sysg.exe miner virus and how you can remove it and prevent it from using your computer to mine for cryptocurrencies. A miner malware, using the sysg.exe process…Read more
The post … Continue reading Sysg.exe Coin Miner Virus – What Is It + How to Remove It

Smart Homes of Tomorrow – This Is Why We Can’t Have Nice Things

Privacy, vulnerability and reliability are the three main issues almost every connected device currently on the market faces, yet consumers are still choosing to automate their homes at an incredible rate. Currently we are seeing a huge growth in prod… Continue reading Smart Homes of Tomorrow – This Is Why We Can’t Have Nice Things

IT threat evolution Q1 2018

In January, we uncovered a sophisticated mobile implant Skygofree that provides attackers with remote control of infected Android devices. Network worm OlympicDestroyer attacked on the Olympic infrastructure just before the opening of the games in February. Continue reading IT threat evolution Q1 2018

CoinImp Coin Miner Virus (JavaScript) – How to Remove It and Stop It

This article has been created in order to explain what is the CoinImp miner malware and how to remove it from your web browser and your computer. A new JavaScript-based coin miner has been detected to be uploaded on websites…Read more
The post CoinIm… Continue reading CoinImp Coin Miner Virus (JavaScript) – How to Remove It and Stop It

Pocket cryptofarms

In recent months, the topic of cryptocurrency has been a permanent news fixture — the value of digital money has been see-sawing spectacularly. Such pyrotechnics could hardly have escaped the attention of scammers, which is why cryptocurrency fluctuations have gone hand in hand with all kinds of stories. These include hacked exchanges, Bitcoin and Monero ransoms, and, of course, hidden mining. Continue reading Pocket cryptofarms

New RIG malvertising campaign uses cryptocurrency theme as decoy

This malvertising campaign uses a popular cryptocurrency theme to redirect users to the RIG exploit kit.
Categories:

Exploits
Threat analysis

Tags: cryptocurrenciesmalvertisingRIGRIGEK

(Read more…)

The post New RIG malvertising campa… Continue reading New RIG malvertising campaign uses cryptocurrency theme as decoy

Cyber Security Roundup for January 2018

2018 started with a big security alert bang after Google Security Researchers disclosed serious security vulnerabilities in just about every computer processor in use on the planet. Named ‘Meltdown’ and ‘Spectre’, when exploited by a ha… Continue reading Cyber Security Roundup for January 2018

Cyber Security Roundup for December 2018

UK supermarket giant Morrisons, lost a landmark data breach court case in December after a disgruntled Morrisons employee had stolen and posted the personal records of 100,000 co-workers online, the supermarket chain was held liable for the d… Continue reading Cyber Security Roundup for December 2018