WOROK: Powerful Malware Hidden in .PNG Images “Unless it’s your first day on the internet, you’re probably aware that downloading certain files can be a serious mistake. It doesn’t take a cybersecurity expert to know that double-clicking the TotallyNotAVirus.exe file that mysteriously appeared in your downloads folder is a bad idea. If you’re a bit more security…
Tag: Malware
Cyber-Crime: Why Hospitals Are The Perfect Targets For Ransomware
RANSOMWARE HAS BEEN an Internet scourge for more than a decade, but only recently has it made mainstream media headlines. That’s primarily due to a new trend in ransomware attacks: the targeting of hospitals and other healthcare facilities. The malware works by locking your computer to prevent you from accessing data until you pay a…
Being a “Criminal” in a Mass Surveillance World
I want to warn you ahead of time, this article is extremely long and sometimes, dense. But Please, don’t give up on it! Read it all the way through, and then re-read it. After that, you will never look at cyber-security and cyber-surveillance “aka Big Brother” the same way again, I ASSURE YOU! Pay Close…
Cyber-Spook Tradecraft
Originally titled Spyfiles 4 on WikLeaks, this very revealing article reveals some very nasty programs that governments around the world use to spy on their citizens. (Please be careful if you choose to download any of the files on that LINK, as the page warns, even though they have been renamed and compressed, they are still…
Beware the Ransomware!
You know, as we steadily progress into the 21st Century, I for one am seeing a lot of criminal behavior CHANGING; or should I say, EVOLVING into something much more devious and utterly mind-blowing than anyone, especially me, could have ever imagined 20 years ago. Now, you don’t need a gun and a mask to rob…
Using a LiveCD (or LiveUSB) Operating System
By: HCS Technical Staff (Author’s Note to the Reader: If there is any jargon that you do not know, please type the word into Wikipedia.) What if you could try a new operating system on your computer without having to wait an hour or two for the operating system to install and not erase everything…
Malware & Cyber Warfare
by HCS Technical Staff How is it done? Offensive computer attacks are usually conducted by exploiting flaws in a computer web interface (most often a “login screen”) or surreptitiously installing malicious software (“malware”) on targeted computers to produce a number of effects on the computer system or devices that it controls. How does it happen? In the broadest…
Using a Live CD Operating System
By: HCS Technical Staff (Author’s Note to the Reader: If there is any jargon that you do not know, please type the word into Wikipedia.) What if you could try a new operating system on your computer without having to wait an hour or two for the operating system to install and not erase everything…