ESET releases new decryptor for TeslaCrypt ransomware

Have you been infected by one of the new variants (v3 or v4) of the notorious ransomware TeslaCrypt? If your encrypted files had the extensions .xxx, .ttt, .micro, .mp3 or were left unchanged, then ESET has good news for you: we have a decryptor for TeslaCrypt. We have been covering this malware for a few … More ESET releases new decryptor for TeslaCrypt ransomware

Location-tracking apps ‘breach of European data protection law’

A study of 20 apps’ terms and conditions by the Norwegian Consumer Council has found that three location-tracking apps may be in breach of European data protection law. In an official complaint to the Norwegian Data Protection Authority, the consumer advocacy group singled out US-based fitness tracking app Runkeeper as a cause for concern. The … More Location-tracking apps ‘breach of European data protection law’

FBI: No, you shouldn’t pay ransomware extortionists

The roll call of organisations hit by ransomware attacks is depressingly long – hospitals, government departments, school districts, banks, businesses small and large… even law enforcement agencies haven’t been able to avoid attacks from what is becoming one of the biggest threats of 2016. The ransomware attacks are particularly damaging, of course, because of their … More FBI: No, you shouldn’t pay ransomware extortionists

Cybersecurity checkup: New Ponemon study reveals how healthcare sector is doing

Health information is both super personal and critical. After all, if your bank accounts are breached, it may creep you out and you might even lose money, but such losses are often insured. If your health information gets hacked, that targets you directly, physically, possibly in ways that insurance can’t fix. If scammers start changing … More Cybersecurity checkup: New Ponemon study reveals how healthcare sector is doing

New self-protecting USB trojan able to avoid detection

A unique data-stealing trojan has been spotted on USB devices in the wild – and it is different from typical data-stealing malware. Each instance of this trojan relies on the particular USB device on which it is installed and it leaves no evidence on the compromised system. Moreover, it uses a very special mechanism to protect … More New self-protecting USB trojan able to avoid detection