Facebook to Use AI to Block ‘Terrorist Content’

Amid growing pressure from governments, Facebook says it has stepped up its efforts to address the spread of "terrorist propaganda" on its service by using artificial intelligence (AI). In a blog post on Thursday, the California-based company announced the introduction of AI, including image matching and language understanding, in conjunction with it already-existing human reviewers …

Wikileaks Unveils ‘Cherry Blossom’ — Wireless Hacking System Used by CIA

WikiLeaks has published a new batch of the ongoing Vault 7 Leak this time detailing a framework – which is being used by the CIA for monitoring the Internet activity of the targeted systems by exploiting vulnerabilities in Wi-Fi devices. Dubbed "Cherry Blossom," the framework was allegedly designed by the Central Intelligence Agency (CIA) with …

Jaff Ransomware Decryption Tool – Unlock Your PC for Free

Hit by Jaff Ransomware? Don't pay the Ransom. You can unlock your files for Free! Kaspersky Labs has released  an updated version 1.21.2.1 of its free ransomware decryption tool, RakhniDecryptor, which can now also decrypt files locked by the Jaff Ransomware. Security researchers at Kaspersky Labs have discovered a weakness in the Jaff ransomware code …

Fireball: Browser Hijacker/Adware

It has been reported that a malware named as "Fireball" targeting browsers is spreading worldwide. The malware "Fireball" has the ability to collect user information, manipulating web-traffic to generate ad-revenue, malware dropping and executing malicious code on the infected machines. According to the reports, Fireball currently installs plug-ins and additional configurations to boost its advertisements, …

Fileless Ransomware with Code Injection Ability Detected

It is no secret that hackers and cybercriminals are becoming dramatically more adept, innovative, and stealthy with each passing day.While new forms of cybercrime are on the rise, traditional activities seem to be shifting towards more clandestine techniques that come with limitless attack vectors with low detection rates.Security researchers have recently discovered a new fileless …

Project Shadowfall Helps Tackle RIG Exploit Kit

RIG has been the top exploit kit since Angler was taken down, delivering both Cerber and CryptoMix ransomwares as well as the SmokeLoader backdoor. Typically, it inserts fake iframes into compromised WordPress, Joomla and Drupal sites. These cause victim browsers to land on attacker-controlled webpages. RIG uses Domain shadowing as one of its main characteristics. …

Countermeasures to Prevent WannaCry Ransomware

WannaCry Also known as Wanna Decryptor or WCry is the fastest emerging ransomware, here we present you all possible ways to prevent it. WannaCry, widely reported as the most significant ransomware attack to date, was first detected on Friday in Britain, crippling hospitals and doctors’ offices – and even causing some patients to be refused …