Malware

The Real Cost of a Ransomware Attack

An Energy Company and Its Customers Targeted by Ransomware The Energy Sector is one that has become more popular with cyber criminals over recent years.  Most customers sit and take notice when they get an email from their electricity or gas company, particularly if it involves special deals, or has an invoice attached.  Cyber criminals […]

date:  Oct 16, 2017 comments:  0
by:  Blog Author category:  All, Malware Read More

MacRansom Threatens Mac Users

Early this month, researchers started publishing warnings about a new, free, macOS-based ‘Ransomware as a Service’ (RaaS) which has recently emerged. The Mac specific ransomware has been dubbed ‘MacRansom’. The tool uses a web portal hosted in a TOR network, which is becoming a more popular method of attack. Note: A TOR Network is an […]

date:  Jun 28, 2017 comments:  0
by:  Blog Author category:  All, Malware Read More

Beware of “Judy”, the Latest Android Mobile App Malware

In late May 2017, security researchers discovered Android malware in around 50 apps which were available on the Google Play Store. Known as “Judy”, named after the malicious apps’ character, the malware is installed in parallel when the infected app is installed to the Android device. Researchers explained that the Judy malware is “an auto-clicking […]

date:  Jun 14, 2017 comments:  0
by:  Blog Author category:  All, Malware Read More

WannaCry Ransomware Attack: A Breakdown

What is it? A global epidemic, WannaCry Ransomware is a type of Malware that has recently attacked victims across all industry sectors such as: Hospitals across the UK; Police Departments in India; car factories in France (like Renault and Nissan) and Universities in China. Ransomware, a growing trend, is when hackers encrypt your files on […]

date:  May 18, 2017 comments:  0
by:  Blog Author category:  All, Malware Read More

How Does the Trickbot Malware Work?

Last week, we talked about a new banking Trojan, called TrickBot, that is plaguing banks all around the world, including the US, UK and Australia. In this article, we will take in inside look at how the Trojan works. TrickBot has made its way into the banking sector over recent months by using a malvertising […]

date:  Mar 01, 2017 comments:  3
by:  Blog Author category:  All, Malware Read More

Trickbot Malware: Beware of this New Banking Trojan!

In September 2016, researchers at Fidelis Cybersecurity discovered a new malware bot dubbed TrickBot or “TrickLoader” by its authors. They found that it had a lot in common with the infamous Dyre banking Trojan. Not only was the loader similar, but the code itself was very familiar, suggesting that some of the original Dyre authors […]

date:  Feb 22, 2017 comments:  0
by:  Blog Author category:  All, Malware Read More

What is Point of Sale (POS) Malware?

A Point-Of-Sale (POS) terminal is a computerised version of a cash register. It has the ability to record and track customer orders, process credit and debit cards, connect to other systems in a network, and manage inventory. Most POS terminals contain a personal computer, which stores specific programs and I/O devices relevant to the company […]

date:  Jan 18, 2017 comments:  0
by:  Blog Author category:  All, Malware Read More

The Importance of Having a Strong Password

The amount of time the average person spends online is constantly increasing. There is a plethora of tasks – banking, shopping, TV viewing, chatting with friends, studying – that people carry out online on a daily basis, and there is always something new, just around the corner, which will drag us back to our PCs […]

date:  Jul 27, 2016 comments:  0
by:  Blog Author category:  All, Malware, Phishing Read More

Energy Bill Scam Locks Computer Files

Most people in Australia would have heard about the recent email scam doing the rounds, purporting to be from a well-known energy company. The email prompted the recipient to click on a link to download a copy of their bill. Instead of downloading an invoice however, the victims actually downloaded a virus (in the form […]

date:  Jun 29, 2016 comments:  1
by:  Blog Author category:  Industry News, Malware Read More