Pages Navigation Menu

SHOWFUN - Show & Fun & More!

New ransomware offers to restore your files for free - if you infect two friends

Posted on 12/12 22:26 in Shows | 0

These pieces of malware encrypt your files and won’t unlock them unless you pay, but the new “Popcorn Time” ransomware offers an alternative: Just infect some friends and you get your files back free.There are various warnings about losing access to your files, and even a function that can delete your files completely if you enter the wrong decryption key four times.

Read More

IBM Accidentally Shipped Malware to its Business Customers

Posted on 05/03 19:23 in Shows | 0

One thing consumers and enterprise customers do have in common, however, is that shipping them malware is a really bad idea.Last week, IBM announced that it had accidentally distributed malware to some of its Storwize customers via a USB drive.

Read More

New Ransomware Attack Used Leaked NSA Exploits to Hit NHS

Posted on 05/12 22:02 in Shows | 0

Organizations across the world have been hit by another wave of ransomware, with targets mostly concentrated in Europe and Asia.Like other forms of ransomware, WanaCrypt0r begins encrypting files on a computer when it is installed.

Read More

NSA-Derived Ransomware Is So Serious, Microsoft Is Patching Windows XP

Posted on 05/15 15:56 in Shows | 0

Last week, we discussed the appearance of a new type of ransomware and the havoc it has wreaked across the internet.Infections have spread across the globe and included institutions in Spain, the UK, China, Russia, and the United States.

Read More

Registering a Domain Accidentally Triggered Ransomware's Kill Switch

Posted on 05/15 22:13 in Shows | 0

The UK’s national Health Service (NHS) and Spanish telco Telefónica were among the most high-profile victims of the WannaCry malware, also known as WanaCrypt0r 2.As bad as the infection was, it could have been much worse if not for a security writer and researcher stumbling upon its kill switch.

Read More

SSDs Vulnerable to Deliberate, Low-Level Data Corruption Attacks

Posted on 05/22 22:02 in Shows | 0

But a new paper from Carnegie Mellon University, Seagate, and ETH Zurich has shown that the way data is programmed into MLC SSDs makes them vulnerable to data corruption attacks, meaningfully reducing the drive’s lifespan in the process.The first SSDs that were developed stored one bit of data per cell and are called single-level cells (SLCs).

Read More

Hackers Use Subtitle Files to Take Over PCs

Posted on 05/24 23:08 in Shows | 0

It’s common to see subtitle files (usually a.There are more than two dozen subtitle file formats, so most media players capable of opening them are designed to process anything that claims to be a subtitle file.

Read More

'NotPetya' Ransomware Locking Down Computers Across the World

Posted on 06/27 21:45 in Shows | 0

A new strain of ransomware is currently hitting computers across the world.Some ransomware tries to look like part of Windows, and others include fancy add-ons like a timer or links to resources about Bitcoin.

Read More

NotPetya Ransomware Hackers Want 100 Bitcoins for Decryption Keys

Posted on 07/06 16:57 in Shows | 0

The story of last week’s NotPetya ransomware outbreak has taken an unexpected turn.For the low price of 100 Bitcoins, he or she will hand over the master decryption keys for the NotPetya malware.

Read More

US Detains, Indicts UK Hacker Who Stopped WannaCry

Posted on 08/04 13:50 in Shows | 0

Back in May, the ransomware WannaCry began infecting critical infrastructure across Europe and in the United States, rising to 230,000 infected machines in 150 countries within a day of its release.(Initially it was reported he was held by the US Marshals, but this appears to have been inaccurate.

Read More

CCleaner Infection More Severe Than Thought, Targeted Microsoft, Google, Samsung

Posted on 09/22 20:53 in Shows | 0

Earlier this week, we reported on news that the popular system maintenance app CCleaner had been infected by malware for nearly a month.The CCleaner malware could be used to deliver a second-stage payload that would run on local systems and perform various tasks.

Read More