Over the last two years or so a large number of research papers and presentations on security flaws in BLE devices came out. By far, the most prevalent hacks against BLE involve capturing handshakes, hard-coded keys and replay attacks. However, these papers and presentations are on the offensive side of this subject, describing different attacks […]
Win32.Virlock with all its variations is both a new kind of file infector and ransomware (screen-locker) at the same time. In this paper, we aim to cover the techniques used by this virus and discuss methods that can be used to detect and disinfect systems affected by it. Virlock uses several techniques, including code-obfuscation, staged […]
It has been 24 years since the PC Cyborg trojan used to scramble file names and demand a ransom in return for restoring them. Since then, cybercriminal minds have engineered new methods for generating revenue. This paper presents the evolution of ransomware and the methods used. An analysis of over 2,000 representative samples (from a […]