Home / Archives For David Balaban

David Balaban is a computer security researcher with over 15 years of experience in malware analysis and antivirus software evaluation. David runs the Privacy-PC.com project which presents expert opinions on the contemporary information security matters, including social engineering, penetration testing, threat intelligence, online privacy and white hat hacking.

Top 10 IoT Security Tips

For most people, Internet of Things is, first of all, his home computer network of smart devices. The number of such devices and the need to connect them together and to the Internet is constantly increasing. Some devices work with local networks; others require access to data stored on specific websites. Besides, many people want to remotely control their house. This kind of communication between you and your IoT devices is the main target of hackers and malicious programs. Tips To Keep IoT Devices Safe Here is the list of tips that will help you stay safe while using the Internet of Things: 1. Always lock the screen and/or password protect the smart devices connected to the Internet. This will prevent unauthorised access. 2. Change the default passwords for all websites, smart devices, a...

The Crypt0L0cker Ransomware Is Underway

The attackers behind the new version of the Crypt0L0cker ransomware seem to never get sleepy, bored or tired of their underground business. Although the name coincides with the above slang word, the ransom Trojan in question is very vigorous. The infection uses a mix of RSA-2048 and AES-128 ciphers to lock down one’s important files beyond recovery. Then, it randomises filenames, appends random ышч lower alphabetic characters extension to all the encoded entries, and blackmails the victim for money otherwise the data will stay inaccessible. The attack process looks really scary. The perpetrating code replaces the original desktop wallpaper with a dark warning image and also expresses its demands via ransom notes called -Instruction.bmp and -Instruction.html. The victim is told to download ...

What Everybody Should Know About Bitcoins

Humans don’t really need anything, except for food, shelter, clothing and clean water. Theoretically, if everyone had the perfect amount of each of those things, we would have no need for money and everyone would live happily ever after. In the real world, some people have more water than others but perhaps less access to food or clothing and trading or bartering for a better balance has always been necessary. But picture this: the local mall, with every shopper carrying around like bulks of cloth or construction grade lumber, to each shopkeeper one by one. Trying to find the one who both has what they need, and needs the thing that they happen to be carrying, kind of ridiculous. That is why we need currency. Compared to cattle, for instance, is easier to use, more durable, and more compac...

Beware Of Hohosearch.com Browser Hijacker

Hohosearch.com prevents access to reputable websites. In particular, it is known to block major search engines like Google, Bing, etc. The search attack is powered by the corresponding browser hijacker. The latter is a computer application. Like any other, it installs into computer system. As the program runs, it scans the computer system to detect installed web browsers. Their settings undergo modification to enable Hohosearch.com redirects. It is hard to explore the web with the infection affecting your web-navigation. Most users are well aware of the impacts. They try to remove Hohosearch.com redirect at the earliest opportunity. Their decision derives high praise. It also requires implementation. The hijacker does not give in easily. It is not that one cannot get rid of Hohosearch with...

Evolution And History Of Locky Ransomware

A new variation of ransomware was detected on February 16, 2016, by Symantec, which is being addressed as Locky. This ransomware is spreading in a swift manner, and this malware is being aggressively pushed by the attackers through compromised websites and massive spam campaigns. This ransomware encodes the data files on computers of the victims with the “.locky” extension. The ransom being demanded varies from 0.5-1 Bitcoins. Spam email campaigns are being utilised to infect the files. Disguised invoices are being spread on the internet by the developers. These emails consist of Word documents that contain a malicious macro attachment. The malicious attachment has been figured out by Symantec as W97M.Downloader. Locky gets installed on the computer of the victims when this they run the ma...

1 2