Welcome to Smokey's Security Forums.
Guests only have limited access to the board and it's features, please consider registering to gain full access!
Registration is free and it only takes a few moments to complete.

Smokey's Security Forums

Please login or register.

Login with username, password and session length
Advanced search  

News:

This Android ransomware threatens to expose your browsing history to all your contacts

A form of Android ransomware which threatens to send the victim's private information and web history to all of their contacts has been discovered in the official Google Play app store.

This Android ransomware threatens to expose your browsing history to all your contacts

Malware Log Analysis & Removal Help * Ransomware Encryption & Decrytion Techniques * Official Jetico Inc. Support Forums

All articles © 2001 - 2017 UBM TechWeb
DarkReading - All Stories Articles
Pages: [1] 2 3 4 ... 135   Go Down
  Subject Replies Views Last post
0 Members and 3 Guests are viewing this board.
How to Build a Path Toward Diversity in Information Security
By Quizmaster
0 1 Last post Today at 05:15:06 PM
by Quizmaster
The Right to Be Forgotten & the New Era of Personal Data Rights
By Quizmaster
0 1 Last post Today at 05:15:06 PM
by Quizmaster
Can Your Risk Assessment Stand Up Under Scrutiny?
By Quizmaster
0 1 Last post Today at 05:15:05 PM
by Quizmaster
Downtime from Ransomware More Lethal to Small Businesses Than the Ransom
By Quizmaster
0 3 Last post Today at 02:15:03 PM
by Quizmaster
How Attackers Use Machine Learning to Predict BEC Success
By Quizmaster
0 3 Last post Today at 05:17:00 AM
by Quizmaster
Adobe's Move to Kill Flash Is Good for Security
By Quizmaster
0 6 Last post July 26, 2017, 11:16:16 PM
by Quizmaster
The Wild West of Security Post-Secondary Education
By Quizmaster
0 6 Last post July 26, 2017, 11:16:15 PM
by Quizmaster
Hacking the Wind
By Quizmaster
0 10 Last post July 26, 2017, 08:16:13 PM
by Quizmaster
Facebook Offers $1 Million for New Security Defenses
By Quizmaster
0 8 Last post July 26, 2017, 08:16:12 PM
by Quizmaster
10 Critical Steps to Create a Culture of Cybersecurity
By Quizmaster
0 8 Last post July 26, 2017, 05:15:16 PM
by Quizmaster
Majority of Consumers Believe IoT Needs Security Built In
By Quizmaster
0 10 Last post July 26, 2017, 05:15:16 PM
by Quizmaster
Iranian Cyber Espionage Group CopyKittens Successful, But Not Skilled
By Quizmaster
0 9 Last post July 26, 2017, 05:16:04 AM
by Quizmaster
How 'Postcript' Exploits Networked Printers
By Quizmaster
0 10 Last post July 26, 2017, 02:15:22 AM
by Quizmaster
How Women Can Raise Their Profile within the Cybersecurity Industry
By Quizmaster
0 14 Last post July 25, 2017, 05:15:25 PM
by Quizmaster
Using AI to Break Detection Models
By Quizmaster
0 12 Last post July 25, 2017, 05:15:25 PM
by Quizmaster
Lessons from Verizon: Managing Cloud Security for Partners
By Quizmaster
0 11 Last post July 25, 2017, 05:15:24 PM
by Quizmaster
Regulators Question Wells Fargo Regarding Data Breach
By Quizmaster
0 14 Last post July 25, 2017, 02:15:17 PM
by Quizmaster
Custom Source Code Accounts for 93% of App Vulnerabilities
By Quizmaster
0 10 Last post July 25, 2017, 02:15:16 PM
by Quizmaster
Voter Registration Data from 9 States Available for Sale on Dark Web
By Quizmaster
0 16 Last post July 25, 2017, 02:15:58 AM
by Quizmaster
Weather.com, Fusion Expose Data Via Google Groups Config Error
By Quizmaster
0 10 Last post July 24, 2017, 11:15:03 PM
by Quizmaster
Pages: [1] 2 3 4 ... 135   Go Up

 

Topic you have posted in
Normal Topic
Hot Topic (More than 10 replies)
Very Hot Topic (More than 20 replies)

Locked Topic
Sticky Topic
Poll


* Permissions
You can't post new topics.
You can't post replies.
You can't post attachments.
You can't modify your posts.
BBCode Enabled
Smilies Enabled
[img] Enabled
HTML Disabled


Except where otherwise stated, all content, graphics, banners and images included © 2006 - 2017 Smokey Services™ -- All rights reserved
Design board graphics, banners and images by Meg&Millie - Emma aka Tinker

This site does not store profiling-, tracking-, third-party and/or any other non-essential cookie(s) on client computers and is fully compliant with the EU ePrivacy Directive
Smokey's does not use any Web Analytics/Analysis Service, and also does not use any browser fingerprinting techniques

    

  

Smokey's also provides free fully qualified FRST (Farbar Recovery Scan Tool) Log / Malware Analysis & Removal Help and System Health Checks
rifle
rifle
rifle
rifle