Ghost Push possesses Android devices; only version 6.0 is safe

scmagazine.com | Bradley Barth | October 17, 2016

“I ain’t afraid of no Ghost Push?” Better think again if you’re an Android user with a device operating on anything lower than version 6.

Baca lebih lanjut

Ransomware: Cerber

20161005-cerber-1-125x100Berikut ini beberapa artikel terkait Cerber Ransomware yang dikutip dari beberapa sumber, mudah-mudahan dapat membantu bagi yang terkena ransomware tersebut:

 

  • vaksin.com | Cerber 3: Ransomware yang sadar marketing
  • bleepingcomputer.com | Cerber Ransomware switches to a Random Extension and Ends Database Processes
  • pcrisk.com | Cerber ransomware removal instructions
  • bleepingcomputer.com | Cerber Ransomware switches to .CERBER3 Extension for Encrypted Files
  • bugsfighter.com | How to remove Cerber3 ransomware and decrypt .cerber3 files
  • keonesoftware | Cerber3 ransomware removal: how to decrypt .cerber3 virus files
  • malwarefixes.com |  Remove Cerber3 Ransomware and Decrypt Files
  • bleepingcomputer.com | Check Point releases working Decryptor for the Cerber Ransomware

Baca lebih lanjut

Android malware spreading through Google’s AdSense network

android-malware-02_story

Neowin.net | Justin Luna | Aug 16, 2016

A group of security researchers have recently discovered a new strain of malware targeting the Android operating system by Google, which also uses its advertising network AdSense to spread itself.

Baca lebih lanjut

Hackers break into Telegram, revealing 15 million users’ phone numbers

telegram-930x602

Image Credit: Paul Sawers / VentureBeat

 REUTERS | venturebeat.com | AUGUST 2, 2016 10:15 AM

(Reuters) — Iranian hackers have compromised more than a dozen accounts on the Telegram instant messaging service and identified the phone numbers of 15 million Iranian users, the largest known breach of the encrypted communications system, cyber researchers told Reuters.

Baca lebih lanjut

Is Zepto ransomware the new Locky?

zeptoPaul Ducklin | 05 JUL 2016 | nakedsecurity.sophos.com | Graham Chantry, Fraser Howard and Benjamin Humphrey of SophosLabs 

Beware the latest arrival on the ransomware scene: Zepto. It’s very similar to the well-known Locky malware, and the consequences of an attack are the same: your files end up scrambled, at which point the crooks offer to sell you the decryption key.

Baca lebih lanjut

In China, fears that Pokemon GO may aid locating military bases

maxresdefault

Reuters.com | PAUL CARSTEN | Fri Jul 15, 2016 7:11am EDT

Not everyone loves Pokemon GO, the mobile game that has become an instant hit around the world since a limited release just a week ago.

Baca lebih lanjut

DroidJack Uses Side-Load…It’s Super Effective! Backdoored Pokemon GO Android App Found

 

Proofpoint.com | Thursday, July 7, 2016 – 18:30

Overview

Pokemon GO is the first Pokemon game sanctioned by Nintendo for iOS and Android devices. The augmented reality game was first released in Australia and New Zealand on July 4th and users in other regions quickly clamored for versions for their devices. It was released on July 6th in the US, but the rest of the world will remain tempted to find a copy outside legitimate channels. To that end, a number of publications have provided tutorials for “side-loading” the application on Android. However, as with any apps installed outside of official app stores, users may get more than they bargained for.

Baca lebih lanjut