Home 2015
Yearly Archives: 2015
Remove TeslaCrypt ransomware and recover encrypted .vvv/.ccc files
Neither TeslaCrypt nor its copycat AlphaCrypt ransomware is new on the cybercrime arena. In fact, this infection first surfaced in early spring 2015, and...
Reason Core Security review
For a security solution to be efficient, it does not necessarily have to be heavyweight and feature-abundant. While some might disagree, the Reason Software...
Remote Exploitation of an Unaltered Passenger Vehicle
Twitter’s Charlie Miller and IOActive’s Chris Valasek present their research on the buzz topic of remotely hacking into the controls of the modern vehicles.
...
Remove Ads by DNS Unlocker adware
The controversial story of DNS Unlocker software got a kick-off into the public realm with a thread created on VIDCreek.tv online sharing community. In...
Chris Rock – I will kill you
In the course of his DefCon 23 presentation, Australian security expert Chris Rock demonstrates how fake death or birth records can be created these...
No Budget Threat Intelligence – Tracking Malware Campaigns on the Cheap
Andrew Morris, formerly an Intrepidus Group employee and currently researcher at Endgame, proves at ShmooCon that threat intel doesn’t have to be expensive.
Andrew Morris:...
Securing our future – Mikko Hyppönen
Mikko Hyppönen, F-Secure’s CRO and security celebrity who needs no introduction, highlights current and emerging concerns caused by ubiquity of the Internet.
I am...
Remove CryptoWall 3.0 ransomware and mitigate the file damage
While the individuals behind CryptoWall 3.0 virus remain pinned to the “most wanted” cybercriminals list, their infamous product has been up and running for...
How not to suck at pen testing – John Strand
John Strand, the owner of Black Hills Information Security, shares his perspective upon what the present-day penetration testing should be like.
The name of this...
Adaptive Penetration Testing by Kevin Mitnick & Dave Kennedy
Computer security gurus Kevin Mitnick and Dave Kennedy taking the floor at DerbyCon to explain the concept of adaptive pentesting and cover its advantages.
Dave...