by Joseph Forbes | May 31, 2017 | Blog Entry, Data Recovery, HACKING, INTERNET, KnowledgeBase (KB), Malware Reports, Microsoft's Malware Protection Center, SECURITY, SOFTWARE, Technicals
Ransomware cyber attacks are quickly becoming the preferred method of attack by cybercriminals. WannaCry, the latest global incident, is particularly damaging because it is also a worm—not just a ransomware program. As a result, it looks for other computers to spread...
by Joseph Forbes | Jul 3, 2016 | Blog Entry, HACKING, Internet Scam Notices, Microsoft's Malware Protection Center, SECURITY, SOFTWARE
The FBI Virus (aka FBI Moneypak scam) is one of the latest malware threats that takes your computer hostage and demands that you pay a $200 fine in order to unlock your computer. The message claims that you have illegally visited or distributed copyrighted content...
by Joseph Forbes | Apr 18, 2013 | Microsoft's Malware Protection Center
Java exploits represent a common attack vector used by the bad guys to infiltrate vulnerable computers via the web browser. We wrote about the rise of Java exploits as early as 2010, and we haven’t seen that trend decline. In fact, in the first quarter of...
by Joseph Forbes | Apr 18, 2013 | Microsoft's Malware Protection Center
This morning, we released Volume 14 of the Microsoft Security Intelligence Report (SIRv14). This new report studies our findings on trends in the threat landscape based on data from more than 1 billion systems worldwide, focusing on data collected in the second half...
by Joseph Forbes | Apr 16, 2013 | Malware Reports, Microsoft's Malware Protection Center, SOFTWARE, Technicals
from Microsoft® Malware Protection Center by msft-mmpc We recently came across an interesting threat that we detect as TrojanDownloader:Win32/Nemim.gen!A. This particular malware is a trojan downloader, and is capable of deleting its downloaded component files in a...
by Joseph Forbes | Apr 11, 2013 | DATA, INTERNET, Internet Scam Notices, Malware Reports, Microsoft Security Response Center, Microsoft's Malware Protection Center, SECURITY
We can safely say that since we encountered our first rogue, they’ve always commanded a presence in the malware ecosystem. That was, until recently we observed a decrease in rogue activity. That’s not to say they went away altogether – no, not at all – but...