Lucian ConstantinRomania Correspondent, IDG News Service

Lucian Constantin writes about information security, privacy, and data protection for the IDG News Service.

Digital Key, security, encryption

New JavaScript spam wave distributes Locky ransomware

Over the past week, computers throughout Europe have been hit by a massive email spam campaign carrying malicious JavaScript attachments that install the Locky ransomware program.

atm cash machine money

Up to a dozen banks are reportedly investigating potential SWIFT breaches

Up to 12 banks have reportedly launched investigations into potential security breaches on their networks after hackers stole $81 million from the Bangladesh central bank earlier this year.

Legislation of privacy security keyboard law legal gavel court ruling

Celebrity hacker Guccifer's confession gives us all a lesson in security

A Romanian hacker known online as Guccifer pleaded guilty to hacking into 100 email and social media accounts belonging to American citizens, including former high-ranking government officials.

Data analytics, big data, business, chart, laptop

Top-level domain expansion is a security risk for business computers

The explosion of new generic top-level domains (gTLDs) in recent years can put enterprise computers at risk due to name conflicts between internal domain names used inside corporate networks and domains that can now be registered on the public Internet.

Digital Key, security, encryption

New DMA Locker ransomware is ramping up for widespread attacks

A new ransomware program called DMA Locker has reached maturity and shows signs of being distributed in widespread attacks.

flash crash

A recently patched Flash Player exploit is being used in widespread attacks

It took hackers less than two weeks to integrate a recently patched Flash Player exploit into widely used Web-based attack tools that are used to infect computers with malware.

ubiquiti airrouter 01

Worm infects unpatched Ubiquiti wireless devices

Routers and other wireless devices made by Ubiquiti Networks have been infected by a worm that exploits a one-year-old remote unauthorized access vulnerability.

20151005 Cisco headquarters sign

Cisco patches high severity flaws in its Web Security Appliance

Cisco Systems has fixed four denial-of-service vulnerabilities that attackers could exploit to cause Web Security Appliance devices to stop processing traffic correctly.

Digital Key, security, encryption

TeslaCrypt ransomware victims can now decrypt their files for free

Victims of the widespread TeslaCrypt ransomware can now decrypt files affected by recent versions of the malicious program.

1 linkedin

A hacker is selling 167 million LinkedIn user records

A hacker is trying to sell a database dump containing account records for 167 million LinkedIn users.

atm cash machine money

Stealthy malware Skimer helps hackers easily steal cash from ATMs

Security researchers have found a new version of a malware program called Skimer that's designed to infect Windows-based ATMs and can be used to steal money and payment card details.

online security

A critical Symantec antivirus engine flaw puts PCs at risk of easy hacking

The antivirus engine used in multiple Symantec products had an easy to exploit vulnerability that could have allowed hackers to easily compromise computers.

xx

An HTTPS hijacking click-fraud botnet infects almost 1 million computers

Over the past two years, a group of cybercriminals has infected almost 1 million computers with malware that hijacks search results, even when they're served over encrypted HTTPS connections.

Digital Key, security, encryption

Researchers crack new version of CryptXXX ransomware

Researchers from Kaspersky Lab have developed a method of decrypting files affected with the latest version of CryptXXX, a malware program that combines ransomware and information stealing capabilities.

petya ransomware logo

The Petya ransomware just got a whole lot worse

The Petya ransomware now bundles a second file-encrypting program for cases where it cannot replace a computer's master boot record to encrypt its file table.