WannaCry Ransomware Decryption Tool Released; Unlock Files Without Paying Ransom

19th May 2017

If your PC has been infected by WannaCry – the ransomware that wreaked havoc across the world last Friday – you might be lucky to get your locked files back without paying the ransom of $300 to the cyber criminals. Adrien Guinet, a French security researcher from Quarkslab, has discovered a way to retrieve the […]

Read More

WannaCry Ransomware

15th May 2017

WannaCrypt, or also known as WannaCry, is a new ransomware that wreaked havoc across the world, which spreads like a worm by leveraging a Windows SMB vulnerability (MS17-010) that has been previously fixed by Microsoft in March. This ransomware hit computer systems of hundreds of private companies and public organizations across the world which is […]

Read More

National Cyber Security Conference 2016

18th November 2016

  CERT-GH is planning a Cyber Security Week in November from 21 – 25. The week will include a conference on the first day, training workshops for days 2 – 3 on forensics and web defacement and a high level CEO’s round table on day three. Day four will be the National Child Online Protection […]

Read More

Malicious websites exploit Silverlight bug that can pwn Macs and Windows

26th February 2016

Malicious websites are exploiting a recently fixed vulnerability in Microsoft’s Silverlight application framework to perform drive-by malware attacks on vulnerable visitor devices, a security researcher has determined.The critical code-execution vulnerability, which Microsoft patched last month, was actively exploited for two years in attack code owned by Italy-based exploit broker Hacking Team. As Ars reported last […]

Read More

Meet Lizard Squad

27th January 2015

The hacker group known as the Lizard Squad has taken responsibility for a series of attacks that has taken down social networking sites;facebook,instagram and some of the biggest gaming networks. The group’s preferred method of disruption is a distributed denial-of-service (DDoS) attack. A DDoS attack is a coordinated effort that involves thousands of computers that […]

Read More

Microsoft Office Hacked: Windows Found ‘Limited, Targeted Attacks’ Within PowerPoint

3rd November 2014

Microsoft has advised users that a new security flaw has been discovered within Microsoft Office that makes it possible for hackers to gain administrative rights to user accounts. The company said the flaw is primarily found in PowerPoint, which has been the target of “limited, targeted attacks.” The hack hasn’t yet been given a label […]

Read More

The SSL 3.0 Vulnerability – POODLE Bug (AKA POODLEbleed)

17th October 2014

On October 14, 2014, a vulnerability was publicly announced in the Secure Sockets Layer version 3 (SSLv3) protocol when using a block cipher in Cipher Block Chaining (CBC) mode. SSLv3 is a cryptographic protocol designed to provide communication security, which has been superseded by Transport Layer Security (TLS) protocols. By exploiting this vulnerability, an attacker […]

Read More

Meet ShellShock: A New Security Threat For Linux, Unix and Mac systems

1st October 2014

A serious security issue with the Bash shell – a major component of both most UNIX-like operating systems – has been discovered, with significant implications for computer security worldwide. The issue is present in all versions of the Bash scripting language up to version 4.3, which effects a majority of Linux machines, and the entirety […]

Read More

Games and Malware

18th September 2014

The gaming industry keeps growing in terms of popularity, and the large population of gamers, and the crowds at Cologne’s Gamescom 2014, represents an opportunity for miscreants to make money. In this blog post, we will explore various attacks specifically tailored to gamers, by starting with trojanized legitimate games, then by exploring some malicious software […]

Read More

ITU, UNICEF set new guidelines for online children protection

12th September 2014

The International Telecommunication Union (ITU) and UNICEF together with partners of the Child Online Protection have set up new guidelines for online child protection targeting companies that develop, provide or make use of information and communication technologies. Known as The Guidelines for Industry on Child Online Protection, the rules also the ICT industry on how […]

Read More

Page 1 of 3123