Blog

Cyber crime

The ransomware threat has significantly grown over time. Each day, a new variant gets added to the ransomware family. Malware are usually delivered through exploit kits and spam emails. Speaking of spam emails, they are either loaded with malicious document files installing the malware or malware directly inside a ZIP...
There can be no two way to the fact that Ransomware has easily become one of the biggest banes of digital security for individual users and enterprises alike. Ransomware is a malware that locks an infected computer or encrypts its files (converts the files into an unreadable form). It then...
It so happens that a vacation taken by a cyber security expert turns out to be yet another eye-opener for many. While holidaying in Vienna, Austria, cyber security expert Benjamin Tedesco comes across a well-camouflaged ATM skimming machine. Before we continue, let us tell you a little about what is...
Kovter Trojan has been in effect since 2013. Being fileless, Kovter is different and stealthier than other Trojan families. It employs various anti-debugging, anti-VM, anti-sandboxing techniques, and has checks for identification of different security analysis tools. It uses different encryption techniques for different purposes. Like other Trojans, Kovter gathers user...