ESET Researchers Have Identified Updates To The TorrentLocker Crypto-Ransomware

TorrentLocker, crypto-ransomware targeting specific countries, has received improvements making it even harder to track and analyse. TorrentLocker, analysed by ESET in 2014, that hit Ireland as well, is still active and, thanks to how it chooses its potential victims with targeted spam, avoids the attention more prominent crypto-ransomware receives. However, ESET researchers have continued to keep their eyes […]

Kimpton Hotels PoS Breach

Krebs on Security is reporting Kimpton Hotels on Wednesday formally acknowledged that malware found on payment terminals in many of its hotels and restaurants may have compromised credit/debit cards of guests who patronized the properties in the first half of this year. Shane Stevens, VASCO Data Security Director of Omni-Channel Identity and Trust Solutions commented below. Shane Stevens, Data Security Director of Omni-Channel […]

SWIFT Network Attacks

Following the news about the SWIFT network attacks, Igor Baikalov, Chief Scientist at Securonix commented below. Igor Baikalov, Chief Scientist at Securonix: “I find it highly amusing that there’s even a discussion of who is responsible for the security of a SWIFT terminal – SWIFT itself, the financial institution, or the local banking regulator? It […] Data Breach Of 43M Records

LeakedSource  announced that it has received 43,570,999 user records from music streaming service The data was reportedly stolen in March 2012 and has been verified. Each record contains username, email address, password and some other internal data. The hashed passwords used the outdated MD5 algorithm, which was declared ‘cryptographically broken and unsuitable for further use’ by […]

One Million IoT Devices Infected By Malware Driven DDoS Bonet

Following the news that one million IoT devices were infected by malware driven DDoS bonet, Sean Newman, Director at Corero Network Security commented below. Sean Newman, Director at Corero Network Security: “This is yet another example of how the collective power of vulnerable devices openly connected to the internet can be harnessed for nefarious activities.  […]