Larry Jaffee

US Crime: Top convictions, guilty pleas and sentences for 2018

US Crime: Top convictions, guilty pleas and sentences for 2018

Attribution is difficult and sometimes it seems that cyber-criminals are beyond the long arm of the law. But hackers - some even foreign nationals - were increasingly brought to justice on both sides of the Atlantic in 2018 for various cyber-crimes.

Cloud infrastructure exposed by multivector, multi-platform malware attacks prevalent, mass scale

Cloud infrastructure exposed by multivector, multi-platform malware attacks prevalent, mass scale

Persistent malicious attacks exposing cloud infrastructure are the result of a perfect storm, Securonix Threat Research reports.

Fancy Bear's LoJax rootkit has been foraging since late '16

Fancy Bear's LoJax rootkit has been foraging since late '16

The lethal LoJax malware thought to be the handiwork of hacker group Fancy Bear (APT28) came to light only this past May, but most likely had been wreaking havoc since late 2016.

Google Play rejecting, whitelisting SMS, phone apps

Google Play rejecting, whitelisting SMS, phone apps

Enforcing a previously announced new policy, Google Play this week began monitoring and potentially rejecting apps that request phone call logs and SMS permissions if they don't abide by a set of rules in an effort to protect user privacy.

McAfee identifies surge in cryptojacking and coin-miner malware

McAfee identifies surge in cryptojacking and coin-miner malware

A continued rise in cryptojacking and growth in coin-miner malware returned to unprecedented levels after a temporary slowdown in the second quarter of 2018 highlight the trends in McAfee Advanced Threat Research's December report.

Google pulls 15 apps from Play Store for fraudulent ad revenue grab

Google pulls 15 apps from Play Store for fraudulent ad revenue grab

Preying on an individuals' desire to personalise their mobile phones, scammers infused at least 15 Android wallpaper apps to redirect phony ad click revenue, reported Trend Micro in a blog post.

Cryptocurrency's legal tender

Cryptocurrency's legal tender

"Good investments don't bite you on the bottom and say we're here. It takes good old hard work and research, the kind they do at Smith Barney ... they make money the old fashioned way: They earn it."

New ransomware Zenis will delete backup files even if victim pays

New ransomware Zenis will delete backup files even if victim pays

A self-proclaimed "mischievous boy" who calls himself "ZENIS" unleashed ransomware attacks that encrypt the files and then purposely deleted the backups.

Gozi ISFB malware spreading more havoc in 2018

Gozi ISFB malware spreading more havoc in 2018

Banking trojan Gozi ISFB, the widely distributed Dark Cloud botnet well known to financial institutions, surfaced a few years ago but increasingly is being deployed in 2018, reports security research firm Talos reports.

RIG exploit kit strikes again, cryptocurrencies malvertising campaign

RIG exploit kit strikes again, cryptocurrencies malvertising campaign

A malvertising campaign uses decoy websites pushing cryptocurrencies and then redirects users to the RIG exploit kit, Malwarebytes Labs said.