Earlier this year, a PoC malware that could infect Apple Macs through a Thunderbolt accessory was introduced. The sequel to the “Thunderstrike“ exploit doesn’t need physical access and can now be delivered online—just like PC threats.
Watch what happens during a ransomware infection, from the time a user receives the email with the spiked attachment to the time the malware itself is executed.
Videogame mods are used as a way to tweak how a game looks, feels, and works. While not inherently bad, game mods do come with a fair share of risks. Case in point: recent incidents show that they're also being used as a way to deliver malware.
A recent string of website defacements call for the release of SpyEye creator Hamza Bendelladj, codename Bx1. Trend Micro, working law enforcement, facilitated his arrest in 2013. Two years after, why is his name still making waves?
It's been around a decade since we've been introduced to ransomware. Let's take a stroll down memory lane to see how it has evolved through some of the notable cases we've tackled through the years.