Click on a filter below to refine your search. Remove filter to broaden your search.
|Last 12 months||remove|
Hint: If you don't want the words you enter to be searched for separately, use quotation marks to find people or exact phrases. See our Search Help section for more hints.
In recent years we've seen increasing numbers of companies fall victim to ransomware that encrypts a compromised computer's files.
Two new pieces of file encrypting ransomware have been identified, one by Symantec and the other by a security researcher at Rackspace.
Lincolnshire county council is back up and running after having been infected with ransomware last week.
KnowBe4 is alerting IT managers to be vigilant of a new ransomware threat that leverages a sleeper function.
"Operation Kofer," as Cybereason refers to the group, targets European companies with a ransomware campaign that avoids detection through APT group techniques.
The ransomware, detected by Trend Micro as CRYPVAULT, is being distributed as an attachment in spam emails and is targeting Russian speakers.
Bromium Labs detailed a new ransomware campaign that holds video game and iTunes files hostage.
The newly discovered ransomware known as " 7ev3n" encrypts victims' files and demands 13 bitcoins for the key.
Symantec wrote in a new blog post that the new ransomware Crypt0l0cker changes its default language depending on the victim's IP address.
The Swedesboro-Woolwich School District's network was taken hostage by ransomware.
When downloaded and executed, the SVG files cause websites to open up that download what appears to be CryptoWall ransomware.
The ransomware locks up the screen with an FBI warning and initially requires a payment of $500 in order to unlock the device.
The town of Tewksbury paid a $500 Bitcoin ransom after the police department's network was infected with a newer variant of CryptoLocker ransomware.
Sixty-seven percent of Android devices are prone to a newly discovered ransomware variant - the first to employ "clickjacking" as a way to fool users into giving away their administrator rights, Symantec warned today in its Security Response blog.
Trend Micro researchers observed upgraded CTB-Locker ransomware being distributed via fake Google Chrome and Facebook emails.
During a panel at SC Magazine's Toronto conference, a panel of IT security professionals discussed ransomware and its possible future iterations.
An amateurish ransomware known as DMA Locker could crash while encrypting files, leaving users confused as to why their machines aren't operational.
Symantec, which analyzed ransom payments made via Bitcoin, said that the author only made $169 from victims before closing up shop.
The threat actors set up malicious adult websites to distribute the malware, and so far infection rates are estimated to be in the thousands.
This latest variant of Simplocker generates a unique key for each device that it infects, making it more difficult to decrypt the files on each device.
Sign up to our newsletters
SC Magazine Articles
- CISO salaries and demand for cyber-skills skyrockets, surprising no-one
- Malwarebytes says sorry for multiple AV bugs, still unpatched
- Ransomware and POS attackers to zero in on small businesses, retailers
- TaxAct breached: Customer banking and Social Security information compromised
- Student SSNs exposed in University of Central Florida breach