Hot Topics
Your Personal Files Are Encrypted-CBT Locker (Critoni Ransomware) -

If you are seeing  “Your personal files are encrypted” message – you are in a big trouble! Ransomware. 

4 days ago | 0
What is Your Password? -

President Obama just unveiled a number of proposals to crack down on hackers. It’s great that the government. 

5 days ago | 0
njRAT Malware – remote control malware -

Warning: The ideas, concepts and opinions expressed in this blog are intended to be used for educational purposes. 

5 days ago | 1

Your Personal Files Are Encrypted-CBT Locker (Critoni Ransomware)

By Blog | On Wed, Jan 21st, 2015 - No Comments »
your-personal-files-are-encrypted

If you are seeing  “Your personal files are encrypted” message – you are in a big trouble! Ransomware is a category that includes infections that block or encrypt the files on users’ computers, and ask for a payment to be made in order for users to be able to retake control over their files. In the case of CBT-Locker (Critoni) Ransomware, you will be presented with a message placed. 

What is Your Password?

By Aamir Lakhani | On Tue, Jan 20th, 2015 - No Comments »
JK Passwords

President Obama just unveiled a number of proposals to crack down on hackers. It’s great that the government is working on this but we need to do a better job of protecting ourselves. So we sent a camera out onto Hollywood Boulevard to help people by asking them to tell us their password.    

njRAT Malware – remote control malware

By Aamir Lakhani | On Tue, Jan 20th, 2015 - 1 Comment
Real Hacking looks like this :)

Warning: The ideas, concepts and opinions expressed in this blog are intended to be used for educational purposes only. The misuse of the information from this article can result in criminal charges brought against the persons in question. Refer to the laws in your province/country before accessing, using,or in any other way utilizing these materials. One of the most popular malware. 

Blackhat Movie Review (2015)

By Aamir Lakhani | On Sat, Jan 17th, 2015 - 1 Comment
imageblackhat-1

Spoiler warning: This article contains plot details from Blackhat the movie (2015). It is hard not to root for Michael Mann. He gave us The Last of the Mohicans and Heat. The Insider and Ali held their own, and I can’t say I didn’t enjoy Collateral. Then things started to get a little strange with Miami Vice, and Public Enemies. One of the most visually stunning directors opts for grittiness. 

Cracked Andromeda 2.06 Spreads Bitcoin Miner

By Blog | On Fri, Jan 16th, 2015 - No Comments »
badbotnetsick

Andromeda is a botnet that has had a long history. The latest version is now 2.09, which most active bots would have already received. Recently, however, our FortiGuard Labs Threat Intelligence system was able to capture the activities of a previous variant of Andromeda that is apparently still alive. During our analysis, we found that it is a cracked version of an old variant, and the author. 

The 7 biggest lies you’ve been told about hacking

By Aamir Lakhani | On Thu, Jan 15th, 2015 - No Comments »
7 lies abut hacking

Online security is increasingly an issue rich for headlines as everyone from movie studios andcelebrities to major retailers and CENTCOM find themselves the victims of digital infiltrators. However, “hacking” is also a very technical issue and, like many technical issues, one the media often gets wrong. So as a citizen of the 21st century, it’s increasingly important to arm yourself. 

Go home Marriott, Hilton, AHLA you’re drunk

By Aamir Lakhani | On Thu, Jan 15th, 2015 - No Comments »
093014blog-wifi-100464618-primary.idge

You’ve probably already heard about Marriott being fined by the FCC for intentionally jamming wifi signals at one of its properties.  Marriott claimed they weren’t motivated by profit, but by the desire to protect consumers from rogue access points.  By jamming any access point that wasn’t theirs, they ensured that you only connected to their slow Internet that they reportedly. 

When Does Cloud Make Sense For Security?

By Joey Muniz | On Wed, Jan 14th, 2015 - 4 Comments
cloud-security-concept

  My buddy Joseph Muniz  from The Security Blogger put together a great article regarding cloud security solutions.. You can find the original post HERE. I see a lot of hesitation from administrators when having a conversation about cloud based security. People seem to be uneasy with the idea of having anything security related managed outside of their company walls. Some administrators. 

Ransomware on Steroids: Cryptowall 2.0

By Blog | On Tue, Jan 13th, 2015 - No Comments »
32b4afe

Andrea Allievi and Earl Carter posted a very interesting article on the Cisco security blog about a new version of Cryptowall. They talk about a very advanced threat capable of bypassing anti-malware and sandbox based defenses along with methods to hide communication to the control center using TOR channels. The original post can be found HERE.  Ransomware holds a user’s data hostage.. 

The Best Cyber Security Talks of 2014

By Aamir Lakhani | On Tue, Dec 30th, 2014 - 6 Comments
Hacking with Raspberry Pi_cover art v4

I decided to put together a list of the best cyber security talks of 2014. The rankings and opinions are purely my own. Some of these were based on technical knowledge, others were entertaining, and lastly some of these are a shout out to my friends and colleagues. Did I miss any? Let me know on Twitter @aamirlakhani or in the comments below. Special shout out to my friend Dan Catalano for.