LeakerLocker goes for extortion over encryption

LeakerLocker goes for extortion over encryption
Encryption errors mean it may be possible to manually recover files encrypted by the NotPetya malware last month, researchers say
Hackers used malware specifically designed to steal payment card information
The advertising malware has raked in $1.5 million for hackers
The group behind the campaign has gone to great lengths to slip under the radar
INTERVIEW: Silicon talks cyber security threats with Aaron Miller, senior technologist at Palo Alto Networks
ANALYSIS: The spreading cyber attack appears to be more about chaos than money-making
UK advertising and marketing giant WPP has been hit by a variant of the Petya ransomware
The Spora ransomware, initially discovered in January, has returned with a new technique aimed at bypassing security protections
A browser hijacking operation initially reported to have 250 million victims by security firm Check Point isn't quite that large, according to Microsoft
INTERVIEW: Mark James, IT cyber security specialist at ESET, discusses cyber threat trends with Silicon at Infosecurity 2017
CyberArk Labs finds GhostHook attack can bypass Microsoft's protection of Windows 10 kernel
It should come as no surprise, but cyber threats are continuing to rise
UCL's networked and shared drives have been shut off as it tackles the cyber attack
Even Apple users need to make sure they are backing up their files
Newly-discovered malware exploits security failings in industrial protocols
The compromise of a highly classified report by an NSA contractor is serious enough, but the poor security measures were worse
The malware causes lockouts while on the hunt for banking credentials
Ad agency in Beijing responsible for malware that infected 250 million computers worldwide, researchers claim
The 'I love you' worm had a devastating impact on computer networks worldwide seventeen years ago
Cyber security firm Check Point reckons it could be the biggest malvertising campaign to hit Google Play
The attacks use 'design shortcomings' in Android to silently take over devices and steal credentials, say Georgia Tech and UC Santa Barbara academics
The security hole could affect thousands upon thousands of Linux and Unix based machines
The Cron hacking gang used malicious apps and software to infect a million Android smartphones
The portal aims to provide security teams with the latest data on cyber threats
The Redmond company has patched the rather embarrassing flaw
The attack highlights the need for the telecoms community to address the security problem in SS7
IBM urges customers to update antivirus and destroy dodgy USB sticks after mishap
Malware is now hand picking private banks, as IBM warns of 'skyrocketing' breaches of financial data
Face palm for Google's security screening. Source of FalseGuide adware is none other than Google Play store