Click on a filter below to refine your search. Remove filter to broaden your search.
|Last 12 months||remove|
Hint: If you don't want the words you enter to be searched for separately, use quotation marks to find people or exact phrases. See our Search Help section for more hints.
Cribit ransomware demands Bitcoin payment to decrypt hostage files, Trend Micro reveals.
Earlier this year, the ransomware was used to steal more than $34,000 in a month's time.
The infamous CryptoLocker ransomware made its way into the computer systems of a Vermont chamber of commerce, costing it $5,000 to replace computers, servers and hard-drives.
Lookout has identified a ScarePakage mobile ransomware that renders Android phones inoperable and attempts to extort ransom via MoneyPak vouchers.
Researchers with Trend Micro have observed a ransomware variant targeting the U.S. that encrypts files using Windows PowerShell.
The command-and-control for a new ransomware identified by Microsoft as Critroni is hidden on the Tor network.
Symantec researchers believe the malicious app is a variant of "Fake Defender," malware used in earlier ransomware scams.
The scam operates similarly to past ransomware incidents, and users are advised to be on guard and never pay the online villains behind it.
In the course of five months last year, a concerning number of users in the US were hit by ransomware, dubbed "Icepol."
The ransomware, being called "Prison Locker" and "Power Locker" on underground forums, uses a harder-to-crack encryption method than comparable malware locking victims out of their computer.
A PhishMe researcher determined that attackers may have compromised 350,000 systems with CryptoWall ransomware and earned more than $70,000 in Bitcoins as part of an ongoing Dropbox phishing scheme.
Android ransomware tells users they were caught looking at illegal content and that they must pay $300 to unblock their device and avoid trouble with the law.
Ransomware scams typically use an official-sounding authority to dupe users into believing they've committed a crime. A new variant leverages the National Security Agency's recently disclosed surveillance program.
Possibly the first ransomware on Android that encrypts files, Android/Simplocker, also has a command-and-control server hosted on Tor.
A trojan variant, Linkup, identified by Emsisoft, takes control of DNS servers, blocks internet access and mines Bitcoins.
Sentinel Labs dubbed the repurposed malware "Gyges."
We're all used to hearing about the typical threats and outcomes, but here are three extremely bizarre news items that stood out to us this year.
Users searching for popular terms may get hit, but following simple removal instructions will leave them and their machines no worse for the wear.
Two young hackers have confessed to a scheme using Apple's Find My iPhone feature to lock phones and iPads, then demand ransom.
Earlier versions of Svpeng impacted mobile users in Russia, stealing card details from customers of major banks.