Profile

Cover photo
Best Security Search
7 followers|3,314 views
AboutPostsPhotosYouTube

Stream

 
"An anonymous hacker discovered a method for riding Uber for free which was posted on an online security community site."

#Uber #flaw #IMEI


An anonymous hacker discovered a method for riding Uber for free which was posted on an online security community site, read our article to learn more.
1
Add a comment...

Best Security Search

Malware, Viruses and DDos  - 
 
"CIA Special Agent 767 is a fake ransomware that has the function to lock the computer screen and demand a ransom amount of $100 USD" 
CIA Special Agent 767 is a ransomware that has the function to lock the computer screen and demand a ransom amount of $100 USD.
1
Add a comment...

Best Security Search

Announcements  - 
 
"Porn films have been produced for as soon as there was a way to capture moving images. As time went on, the genre grew from a few illegal dirty pictures into the multi-billion dollar industry that it is today and it’s mostly thanks to Internet streaming. And that’s when the cyber-security issues start." 
Porn films have been produced for as soon as there was a way to capture moving images. As time went on, the genre grew from a few illegal dirty pictures...
1
Add a comment...

Best Security Search

Malware, Viruses and DDos  - 
 
"Your Windows Computer Has Been Blocked" warning message is one of the best-known signs of a malware infection.
#malware #windows
Read this guide to learn all about the Your Windows Computer Has Been Blocked message notifications and to learn how to remove this malware infection.
1
Add a comment...

Best Security Search

Malware, Viruses and DDos  - 
 
Nomoneynohoney@india.com - a Trojan malware that has been used in a variety of attack campaigns #ransomware #security 
1
Add a comment...

Best Security Search

Shared publicly  - 
 
CryptoWire ransomware uses the file infix .encrypted after it encrypts files with AES 256 encoding cipher.
#ransomware #AES #CryptoWire 
CryptoWire ransomware virus is a threat that infects users’ computers making almost all of the stored data unusable. It uses the strong AES encryption algorithm that changes the file structure and then generates a key for the decryption. The creators of this offensive crypto-virus aim to extort a ransom payoff by the victims. The ransom payment should be paid in BitCoin value. However, we advise all victims to skip the ransom payment. This articl...
1
Add a comment...

Best Security Search

General Stuff  - 
 
A backdoor discovered in WhatsApp leaves the private chats vulnerable to spying from third parties like Facebook and law enforcement and intelligence authorities.

#CyberSecurity #Insecure #WhatsApp #flaw
Security experts have discovered that the popular WhatsApp has not handled the conversations over the service in the most secure manner.
1
Add a comment...
 
"Ubuntu administrators and end-users should immediately patch their systems as a critical bug was discovered in the Apport utility which is used for crash and bug reports." 
Users of the Ubuntu Linux distributions and its derivatives should update their systems as a new security issue has been identified in the Apport utility.
1
Add a comment...

Best Security Search

Hacks and Attacks  - 
 
"The new tactics shows that the criminal operators are trying out new novel tactics to infect even more victims with the dangerous software. "

#Cerber #ransomware #cybersecurity
A new malicious campaign has been discovered, it spreads the newer versions of the Cerber ransomware virus through the TOR anonymous network.
1
Add a comment...
 
Turkey blocks access to social media sites. Learn what the reason is.
#YouTube #WhatsApp #Skype #Twitter
The citizens of Turkey suffered yet another blackout of Internet services. This time, the state blocked WhatsApp, Skype, YouTube and Twitter.
1
Add a comment...

Best Security Search

Hacks and Attacks  - 
 
The technique named AtomBombing inserts malicious code into legitimate processes by using Windows Atom tables.
#Windows 
The security researchers from enSilo discovered a new injection method that inserts malicious code into legitimate processes by using Windows Atom tables.
1
Add a comment...

Best Security Search

Shared publicly  - 
 
Locky ransomware creators have made changes of the threat again. Now victims of Locky can observe the extension .thor appended to their encrypted files. Beware of spam emails that have no text in the body but just an attachment. 
The Locky virus now uses the .thor extension. The ransomware now evolves on a daily basis. Just yesterday, we reported on the new .shit Locky variant.
1
Add a comment...
Story
Introduction

BestSecuritySearch.com is a blog dedicated to cyber security and technology. We provide our readers with up to date security news, PC tips, the latest news about cyber threats, protection measures against them and instructions on how to easily remove malware and other unwanted software. Follow us and stay protected!