Monthly Archives: July 2014

CTB-Locker (Critroni) on the rise and using TOR

Attackers are implementing new strategies to exploit new vulnerabilities and increase their bot network.  Critroni is a new malicious program that have been sold in the underground forum. this kind of malware uses Tor network for the command and control

RpcView – Tool to explore RPC functionality

RpcView is a free tool that can be used to monitor and decompile all registered interfaces on windows operating system. Information provided by this tool include the following: the Pid of the process hosting this endpoint; the used protocol among

Privacy Groups Calling for Internet Users to Employ More Security Tools

When Edward Snowden blew the whistle on the National Security Agency last summer, revealing that the agency had spied on millions of people online, Internet privacy advocates and security experts were concerned. If the U.S. government was able to engage

Don’t Let Usability Issues Compromise Security

Anyone who has worked in an office environment as probably received an email or alert notifying staff that it’s time to change their login passwords (again) — and that those passwords have to meet an ever growing list of criteria:

‘This Content Might Require Java Update 13.6’ Is a Masked Malware Attack

Java update is one of the technique that is used by cyber-criminal to promote their malwares. over this week onlinethreatalerts posted a new article that cover an online advertisement urging users to update their Java application to display certain content.