Onion Ransomware News: Improved Version of CTB-Locker Emerges
New version of CTB-Locker, a ransomware that uses Tor and Bitcoin to evade detection and takedowns, should be avoided at all costs.
225 articles
New version of CTB-Locker, a ransomware that uses Tor and Bitcoin to evade detection and takedowns, should be avoided at all costs.
Kaspersky Lab experts analyze the security and privacy trends that emerged in 2014, including anonymous Tor browsing, ransomware, APT attacks and more.
Ransomware is a common and much-feared problem. Here are ten facts to help in dealing with it.
Cybercrime is a rather lucrative business. Cybercriminals are earning a lot, or at least their effort-to-profit rate is good enough for them to keep going. But how good is it?
Malware using Tor for communication with C&C servers is a novelty; it may not make the malware itself more dangerous, but eradicating it becomes a much more serious problem.
A new version of file-encrypting malware hides its sever inside an anonymous TOR network, making it safer for criminals to extort money from victims.
This week: the first ever Android encryptor malware, a serious Tweetdeck vulnerability arises and is fixed just as quickly, and much more.
Computer ransomware is getting more sophisitcated, while mobile cryptolockers are emerging both in Europe and the U.S.
Data breaches seemed to dominate the security news in May, but mobile ransomware emerged as well and there was good and bad privacy news from the tech giants.
New ransomware targets Apple users running iOS mobile and O SX Mac devices with a piece of malware that blocks use and demands payments.
A new piece of ransomware is targeting Android users and may be related to the infamous CryptoLocker malware.
Ransomware in general is not exactly the nastiest malware out there, but a new variant – called CryptoLocker – is particularly worrisome because it actually does what most ransomware merely
Most of us can no longer imagine a world in which we aren’t digitally connected at all times, and cybercriminals are well aware of this. With the growing importance of
If you use the Internet, then you’re sure to have encountered screen lockers. You may be one of the unlucky people who have encountered that embarrassing moment when an explicit
Extortion, blackmail and ransom requests have always been cornerstones of criminal activity. In today’s global internet economy, criminals are adapting their techniques by attempting to extort money from people using