Nederlands Français English

Heca Systems                              
Home
Contact
Diensten
Producten
Virus info
Downloads
Links


Malware Top10:
Tue, 01 Oct       Trojan.JS.NODSTER.A
Tue, 01 Oct       Trojan.JS.KOVCOREG.A
Mon, 16 Sep       Rootkit.Linux.SKIDMAP.A
Mon, 16 Sep       Coinminer.Win64.MALXMR.TIAOODBZ
Mon, 19 Aug       Backdoor.Linux.BASHLITE.SMJC2
Tue, 23 Jul       ELF_SETAG.SM
Fri, 19 Jul       Backdoor.Perl.SHELLBOT.D
Tue, 09 Jul       Backdoor.Linux.MIRAI.VWIQT
Thu, 27 Jun       Ransom.MSIL.FREEZING.A
Thu, 13 Jun       Backdoor.Perl.SHELLBOT.AB
    


Latest 10 Virus Alerts:
20 Oct 2019       Troj/Zbot-NSN
20 Oct 2019       Troj/TeslaAg-BJ
20 Oct 2019       Troj/DNetInj-LR
20 Oct 2019       JS/Agent-BCHI
20 Oct 2019       Troj/Ransom-FRG
20 Oct 2019       Troj/Ransom-FRF
20 Oct 2019       Troj/Zbot-NSO
20 Oct 2019       Troj/NanoCo-YR
20 Oct 2019       Troj/Phish-GGL
20 Oct 2019       Troj/XMLDwn-AU

Latest Adware and PUA:
18 Oct 2019       LULU Software
18 Oct 2019       IStartSurfInstaller
17 Oct 2019       AirInstaller
17 Oct 2019       Cryptocoin miner
16 Oct 2019       Strictor
16 Oct 2019       Softcnapp
16 Oct 2019       Linkury
16 Oct 2019       KuaiZip
16 Oct 2019       Browser Security
15 Oct 2019       Android MeinShow Porn




Panda Security's Infection Map
Panda Free Tools
Panda ActiveScan 2.0
Panda Security's Web Site


Latest 10 Threats:
Thu, 17 Oct       Hacktool.Rotpotato!g1
Mon, 14 Oct       Packed.Generic.553
Mon, 14 Oct       SONAR.Hybirdmy!g2
Mon, 14 Oct       SONAR.SuspLaunch!g84
Thu, 10 Oct       Hacktool.Rotpotato
Wed, 9 Oct       ISB.Dropper!gen15
Wed, 9 Oct       Hacktool.Avet
Fri, 4 Oct       PHP.Comminer
Tue, 1 Oct       Bloodhound.DBmacro!g1
Mon, 30 Sep       Backdoor.Netegol!gm

Latest 10 Risks:
Thu, 1 Aug       PUA.SafelyOnline
Mon, 29 Jul       Adware.4SharedDesktop
Tue, 23 Jul       Hacktool.Sharpdpapi
Tue, 23 Jul       Hacktool.Foxplace
      ActiveContent.DI.1
Thu, 4 Jul       Hacktool.Sharphound
Tue, 11 Jun       Hacktool.Safetykatz
Thu, 4 Apr       PUA.Avrising
Wed, 3 Apr       Hacktool.ProcHack
Thu, 28 Mar       PUA.FileConvTab

Symantec Threatcon website


avast! Home

avast! Virus Monitor
avast! Free Antivirus
avast! Online Scanner




AVG Anti-virus
AVG Anti-virus Free Edition




Analyze suspicious files and URLs


Internet Storm Center Infocon Status
A data breach forced this family to move home and change their names (ZDNet)
No More Ransom project has prevented ransomware profits of at lest $108 million (ZDNet)
Ransomware crooks hit Synology NAS devices with brute-force password attacks (ZDNet)
Malicious 'Google' domains used in Magento card card skimmer attacks (ZDNet)
Cyberlaw wonks squint at NotPetya insurance smackdown: Should 'war exclusion' clauses apply to network hacks? (The Register)
How to prevent unsigned Docker images from being pulled (TechRepublic)
Vulnerabilities Found in Mitsubishi Inverter Engineering Software (SecurityWeek)
Cannabis authentication system roots out counterfeit weed (ZDNet)
Live Webinar Close the Gap on Insider Threat: Granular Access Controls Behavior Analytics (InfoRiskToday)
Sanctions-hit Russian developers fingered for crafting 'Monokle' Android snoopware (The Register)
Johannesburg Utility Recovering After Ransomware Attack (InfoRiskToday)
Health IT Groups Push for OK of National Patient ID Measure (InfoRiskToday)
Researchers Discover Android Surveillance Malware Built by Sanctioned Russian Firm (SecurityWeek)
Telegram voicemail hack used against Brazil's president, ministers (ZDNet)
66% of SMBs don't believe they are vulnerable to cyberattacks (TechRepublic)
MyDoom: The 15-year-old malware that's still being used in phishing attacks in 2019 (ZDNet)
GitHub starts blocking developers in countries facing US trade sanctions (ZDNet)
Louisiana Declares Emergency After Malware Attacks (InfoRiskToday)
Mirai-Based Botnet Launches Massive DDoS Attack on Streaming Service (SecurityWeek)


The Register - Security

Microsoft and dance partners coordinate firmware defenses with Secure-core PCs (22 October 2019)
Just a friendly reminder there were no at-the-time classified secrets on Clinton's email server. Yes, the one everyone lost their minds over (22 October 2019)
ATTK of the Pwns: Trend Micro's antivirus tools 'will run malware – if its filename is cmd.exe' (21 October 2019)
Row erupts over who to blame after NordVPN says: One of our servers was hacked via remote management tool (21 October 2019)
Avast lobs intruders into the 'Abiss': Miscreants tried to tamper with CCleaner after sneaking into network via VPN (21 October 2019)
Assange fails to delay extradition hearing as date set for February (21 October 2019)
No one would be so scummy as to scam a charity, right? UK orgs find out the hard way (21 October 2019)
Trend Micro would like you to fall in line and become a victim of Cloud Conformity (21 October 2019)
If there were almost a million computer misuse crimes last year, Action Fraud is only passing 2% of cases to cops (21 October 2019)
Iran? More like Ivan: Brit and US spies say they can see through Turla hacking group's facade (21 October 2019)
Malware hides as iOS jailbreak, Sucuri is insecuri, and China is about to get even worse (21 October 2019)
Deus ex hackina: It took just 10 minutes to find data-divulging demons corrupting Pope's Click to Pray eRosary app (18 October 2019)
How does £36m sound, mon CHERI? UK.gov pumps cash into Arm security research (18 October 2019)
Google slings websites into Chrome's solitary confinement on Android to thwart Spectre-style data snooping (18 October 2019)
Help! I bought a domain and ended up with a stranger's PayPal! And I can't give it back (17 October 2019)
A cautionary, Thames Watery tale on how not to look phishy: 'Click here to re-register!' (17 October 2019)
Remember the Democratic National Committee email leak? Same hackers now targeting EU countries, say malware boffins (17 October 2019)
Hundreds charged in internet's biggest child-abuse swap-shop site bust: IP addy leak led cops to sys-op's home (16 October 2019)
Sure is quiet from Adobe. No security fixes this month? Great job. Oh no, wait, what's that stampede sound... (15 October 2019)
Ye olde Blue Screen of Death is back – this time, a bad Symantec update is to blame (15 October 2019)


threat post
Gustuff Android Banker Switches Up Technical Approach (21 Oct 2019)
U.S. Government, Military Personnel Data Leaked By Autoclerk (21 Oct 2019)
Turla Compromises, Infiltrates Iranian APT Infrastructure (21 Oct 2019)
Avast Network Breached As Hackers Target CCleaner Again (21 Oct 2019)
New Way Found to Use Alexa, Google to ‘Voice Phish’ and Eavesdrop on Users (21 Oct 2019)
Microsoft Tackles Election Security with Bug Bounties (18 Oct 2019)
Execs Could Face Jail Time For Privacy Violations (18 Oct 2019)
Major Airport Malware Attack Shines a Light on OT Security (18 Oct 2019)
Four-Year-Old Critical Linux Wi-Fi Bug Allows System Compromise (18 Oct 2019)
Podcast: Insider Attacks May Soon Cost Less Than Malware-based Equivalent (18 Oct 2019)


ZDNet
No silver bullet for online porn says Australian eSafety Commissioner
Avast: No plans to discontinue CCleaner following second hack in two years
Trend Micro picks up Cloud Conformity for $70 million
Australia as concerned about cyber Bond villains as state actors
No-deal Brexit: The privacy regulatory landscape is about to become more complex than ever
Major German manufacturer still down a week after getting hit by ransomware
NordVPN confirms data center breach
Opposition grows as Brazil advances single citizen database plans
Open database leaked 179GB in customer, US government, and military records
Russian APT Turla targets 35 countries on the back of Iranian infrastructure
Researchers find stealthy MSSQL server backdoor developed by Chinese cyberspies
Avast says hackers breached internal network through compromised VPN profile
Google to roll out update 'in the coming' months to fix Pixel 4 Face Unlock bypass
Chinese national sentenced for trying to smuggle military tech from US to China
ASIO turning to AI to avoid missing things
US politicians from AOC to Ted Cruz concerned over Apple's stance on Hong Kong
Former Twitter CISO shares his advice for IT security hiring and cybersecurity
Alexa and Google Home devices leveraged to phish and eavesdrop on users, again
US stopped using floppy disks to manage nuclear weapons arsenal
Blockchain helps enterprises' digital ecosystems in Asia-Pacific





Powered by IP2Location.com