Heimdal Security
Follow
67 Followers
Follow Heimdal Security on their other social channels!
About Us
Founded:
2011
Company Size:
11-50 employees
Company Type:
Private
Location:
Denmark
Website:
We protect users and companies from cyber-criminal actions, by keeping confidential information and intellectual property safe. We build products focused on proactive cyber security and we dedicate a big part of our efforts to cyber security education for everyone.
Read more
Promoted Content
Expert Roundup: Is Internet Security a Losing Battle?
Follow
16
Adware: Definition and Removal Guide
Everybody hates ads, but we’ve kind of gotten used to them and have developed something called advertising blindness, which kind of stops us from noticing them. Chances are you can’t remember more than one advertising poster present on your way to work. Advertisers know this, so they try to make their ads stand out as much as possible, just so they can get some attention time from you. However, some advertisers try to solve this problem not by making more entertaining or releva ...
Follow
21
Beware of Scams Using Fake Facebook Profiles
We spend a lot of time on social media, and for good reason. It has collapsed the communication distance between us and other people, bringing us closer. Source However, this category of “other people” includes persons you would never want to meet: scammers, blackhat hackers, and other such online criminals. In this article, we want to show how you can identify a fake online profile, and avoid any of their scamming attempts. Scams using fake Facebook, Snapchat, Instagram accounts At ...
Follow
49
Security Alert: New TorrentLocker Variant Targets Denmark in Ransomware Attacks
Two large spam waves swept across Denmark in the past 5 days. Both carry the notorious TorrentLocker ransomware and feature a few new tricks. Oblivious users are misled into opening a Microsoft Word document in which cybercriminals embedded a malicious macro. If the victim enables the macro by clicking on “Enable Editing”, a PowerShell code will be executed and it will download ransomware from the TorrentLocker family. The encrypting malware is downloaded via HTTP GET via the ...
Follow
27
Doxxing Can Ruin Your life. Here’s How (You Can Avoid It)
A few hundred years ago, Hansel and Gretel were living in a German land struck by famine. Their stepmother despised the two children, and used the famine to manipulate their father to abandon them in the woods, claiming there were too many mouths to feed. Hansel learned of her plan, and used breadcrumbs to leave a trail on the road. After they were abandoned in the wood, Hansel and Gretel simply needed to follow the breadcrumb trail to find their way back home. Source This is a children’s ...
Follow
17
Doxxing Can Ruin Your life. Here’s How (You Can Avoid It).
A few hundred years ago, Hansel and Gretel were living in a German land struck by famine. Their stepmother despised the two children, and used the famine to manipulate their father to abandon them in the woods, claiming there were too many mouths to feed. Hansel learned of her plan, and used breadcrumbs to leave a trail on the road. After they were abandoned in the wood, Hansel and Gretel simply needed to follow the breadcrumb trail to find their way back home. Source This is a children’s ...
Follow
54
How Every Cyber Attack Works – A Full List
You must have heard it on the news: “Country X accuses country Y for launching a cyber attack against its infrastructure” or “Huge leak at Corporation X, account information of millions of users leak”. Sometimes, you don’t even need to hear it on the news, but instead it is right there, plastered all over your computer screen: “Your information has been encrypted, and the only way to recover it is to pay us”. All of these are cyber attacks. What is a cy ...
Follow
31
Security Alert: TeamSpy Malware Spammers Turn TeamViewer into Spying Tool in Targeted Attacks
A new spam campaign emerged over the weekend, carrying the TeamSpy data-stealing malware, which can give cybercriminals full access to a compromised computer. The last time that TeamSpy made the news was in 2013, when a nearly 10 years long cyber espionage operation was uncovered. The report from 3 years ago mentions that: It seems that the main objective of the attackers was information gathering from the infected computers. Many of the victims appear to be ordinary users, but some of the ...
Follow
26
Security Alert: Aggressive Campaign Compromises Websites to Deliver Ransomware and Financial Malware
As you’re reading this, an ongoing campaign is aggressively targeting legitimate web pages powered by insecure CMSs (Content Management Systems). The attackers’ objective is to inject malicious code – specifically EITest code – into these vulnerable websites. As a result, when users visit the compromised websites, they will be automatically redirected to pages such as the ones below (selection sanitized for your protection): gree.sitetrafficbrokers [.] com ...
Follow
27
Heimdal Joins No More Ransom in the Global Fight against Ransomware
Last year, ransomware asserted itself as the dominant cyber threat on a global scale. The numbers themselves are stupefying. Over a hundred new ransomware families emerged last year, while companies and users were extorted for hundreds of millions of dollars. What’s more, the average value of a ransom demand climbed from $294 at the end of 2015 to $679 in April 2016. Percentage of New Families of Misleading Apps, Fake AV, Locker Ransomware, and CryptoRansomware Identified Between 2005 and ...
Follow
39
Security Alert: Dridex Financial Malware Targets UK Users in Fake Invoice Campaign
About two-three years ago, Dridex was the king of financial malware, making its creators millions by reusing and improving the leaked Zeus GameOver code. Just how many millions? $13.6 m Officials believe that the cybercriminals behind Dridex and Dyre defrauded Internet users of around $13.6 million, before getting arrested in November 2016. However, because this is a complex criminal operation, the ones that got caught last year were the money mules, not the creators of the malware themselv ...
Follow
We\'re excited to announce that we\'ve joined the No More Ransom project to help Internet users worldwide prevent ransomware attacks and use the free decryption tools available to reclaim their data! More news on this coming soon! Official announcement here: https://www.europol.europa.eu/newsroom/news/no-more-ransom-new-partners-new-decryption-tools-new-languages-to-better-fight-ransomware

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

Cybrary|0P3N

Kali Linux – Hacking Tutorials
Views: 2072 / March 22, 2017
FTP Automated Shell Scripts
Views: 837 / March 22, 2017
StoneDrill Malware
Views: 2287 / March 21, 2017
Anatomy of a Ransomware Attack – Part 6
Views: 1428 / March 21, 2017
Skip to toolbar
Cybrary works best if you switch to our Android-friendly app
Continue

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel