[email protected] +603-2181 3666
Extol Threat Intelligent Notification
Infosecurity Europe 2015
June 4, 2015

This week we joined droves of vendors and executives in celebrating InfoSecurity Europe’s 20 year anniversary. The venue, the London Olympia, is a behemoth filled wall-to-wall with company banners, awkward sales pitches, gimmicky totebags, gift lightsabers, and ‘free’ prosecco readily exchanged for cloud security pitches. Security vendors, security vendors everywhere This year, the organizers wisely […]

Using Image to Hack Computers
June 2, 2015

BREAKING NEWS! In last week’s advisory, dated 25 May, we talked about JPEG files being used as a vehicle to spread malware. Now you can get hacked by just clicking on a photo.  That photo of a pretty woman that you just received, or a photo of a cute animal that someone has sent you, […]

With the 2014 tax filing season in the rearview mirror, state tax authorities are struggling to incorporate new approaches to identifying and stopping fraudulent tax refund requests, a $6 billion-a-year problem that’s hit many states particularly hard this year. But some states say they are encountering resistance to those efforts on nearly every front, from Uncle […]

When identity thieves filed a phony $7,7700 tax refund request in the name of Joe Garrett, Alabama’s deputy tax commissioner, they didn’t get all of the money they requested. A portion of the cash went to more than a half dozen U.S. companies that each grab a slice of the fraudulent refund, including banks, payment […]

Facebook 151 Twitter 41 Google+ 18 The Spanish Police has warned of the reappearance of the Police Virus for Android. Here we explain you how can they attack your cell phone, and what can you do to protect it! *** Posted June 2, 2014 A few days ago a new Android malware showed up, Android/Koler.A. […]

Locker Ransomware
June 1, 2015

This is a new strain of ransomware that lies dormant on infected computers until malware operators decide to unleash it upon unsuspecting victims.  This malware uses a sleeper function.  It infects the maximum number of machines and then activates when no one expects it. Due to the increased number of users reporting infections, it is […]

Mobile Forensics World 2015
June 1, 2015

A little discussed but well-attended dual-lineup conference on forensics and investigations started today in Myrtle Beach, South Carolina as “Mobile Forensics World” and the “Techno Security and Forensics Investigations Conference”. Presentation content here mostly focuses on technologies used in fighting cybercrime malware and the general misuse of mobile and computing power for serious criminal activities. Some of the talks focused […]