• img December 12, 2017

An analysis of 120 mobile app stores uncovers plethora of malicious apps

RiskIQ analyzed 120 mobile app stores and more than 2 billion daily scanned resources. In listing and analyzing the app stores hosting the most malicious mobile apps and the most prolific developers of malicious apps, their Q3 mobile threat landscape report documents an increase in blacklisted apps over Q2, as well as the continued issues […]

Read More
  • img December 12, 2017

Return of Necurs botnet brings new ransomware threat

The Necurs botnet has returned to the top ten most prevalent malware during November 2017, as cybercriminals used it to distribute a new form of ransomware, according to Check Point. Researchers found that hackers were using Necurs, considered to be the largest spam botnet in the world, to distribute the relatively new Scarab ransomware that […]

Read More
  • img December 11, 2017

Vulnerability Found in Two Keyless Entry Locks

Researchers are warning of a default-configuration vulnerability in the enterprise-class keyless entry products made by AMAG Technology.   This post was originally published on https://threatpost.com/feed/. https://blacklakesecurity.com/vulnerability-found-in-two-keyless-entry-locks/

Read More
  • img December 11, 2017

MoneyTaker’s stealthy hacking spree spread from US to Russia

A stealthy group of Russian-speaking hackers has been targeting financial organizations (banks, credit unions, lenders) in the US and Russia, stealing money and documentation that could be used for new attacks. The targets The group’s operations have been detailed in a report by Russian cyber attack investigators Group-IB, who investigated over 20 attacks that have […]

Read More
  • img December 11, 2017

Keylogger found in Synaptics driver on HP laptops

For the second time this year, a security researcher unearthed a keylogger in a driver used on a number of HP laptops. The first time was earlier this year, when Swiss security firm modzero AG discovered a keylogger in Conexant HP audio drivers that stored records of keystrokes in a file in the public folder, […]

Read More