Advertisement
Top

Tag: Malicious


Security, Threats & Malware

Who Is Marcus Hutchins?

September 6, 2017

Via: Krebs on Security

In early August 2017, FBI agents in Las Vegas arrested 23-year-old British security researcher Marcus Hutchins on suspicion of authoring and/or selling “Kronos,” a strain of malware designed to steal online banking credentials. Hutchins was virtually unknown to most in […]


Malware

Locky ransomware returns with new tricks up its sleeve

September 5, 2017

Via: Help Net Security

Locky ransomware is back, again, delivered with the help of new tricks to fool users and anti-malware defenses. Massive spam campaign Delivered through one of the largest spam campaigns in H2 2017 – as many as 23 million sent messages […]


Phishing

Beware phishing scams in Amazon listings

January 13, 2017

Via: Naked Security

Be careful what you click: There’s a new phishing scam hitting Amazon listings that look like legitimate deals, offering great prices on “used – like new” electronics. If you click these links on Amazon, you’ll be redirected to a very […]


Malware

Clickjacking campaign abuses Google Adsense, avoids ad fraud bots

January 12, 2017

Via: Malwarebytes

Ad fraud is one of many issues that contribute to the ad industry’s negative image these days. Unlike malvertising which affects end users by infecting them with malware, ad fraud costs advertisers billions of dollars in adverts that were never […]


Threats & Malware

Free 3G internet from WhatsApp? No, it’s a scam

January 6, 2017

Via: Naked Security

It’s still the first week of 2017, and we’ve already had a WhatsApp scam warning from a keen Naked Security reader. This one tries to draw you in by claiming you’ll get free Wi-Fi service, promising to keep you connected […]


Malware

PowerShell threats surge: 95.4 percent of analyzed scripts were malicious

December 9, 2016

Via: Symantec Connect

Malicious PowerShell scripts are on the rise, as attackers are using the framework’s flexibility to download their payloads, traverse through a compromised network, and carry out reconnaissance. Symantec analyzed PowerShell malware samples to find out how much of a danger […]


Phishing

Phishing emails promising invites to cybersecurity conference actually dispersing malware

December 8, 2016

Via: SC Magazine

File this one in the “Irony” department: Threat actors have been discovered trying to infect security-minded individuals with a Trojan downloader by sending spear phishing emails that offer free invitations to Palo Alto Networks’ Nov. 3 Cyber Security Summit in Jakarta, Indonesia. […]


Email security

Fake ISP Complaint Emails Distribute Locky Ransomware Variant

November 23, 2016

Via: Security Week

Distributed via spam emails pretending to be complaints from an Internet Service Provider (ISP), a newly observed Locky ransomware variant appends the .AESIR extension to the encrypted files, security researchers reveal. Ever since it first emerged in February of this […]


Malware

Carbanak Attacks Shift to Hospitality Sector

November 17, 2016

Via: Threat Post

The Carbanak cybercrime gang, best known for allegedly stealing $1 billion from financial institutions worldwide, have shifted strategy and are targeting the hospitality and restaurant industries with new techniques and malware. According to security researchers at Trustwave, over the last […]


Access control, Mobile security

I can see your texts: A deep dive into SMS/messaging clients, security, and privacy

November 7, 2016

Via: We Live Security

Looking at the multitude of different types of SMS users out there, there is a very high probability that there is someone who wants to read or gain access to another user’s SMS messages. What kind of SMS client is […]


Cyber warfare

International Internet Day: A great network targeted by cybercriminals

October 31, 2016

Via: We Live Security

Nearly half a century ago, history was made with the ‘successful’ transmission of data between two computers in California. The letters ‘lo’ were sent – it should have been the world ‘login’, but that’s a moot point – establishing the basis […]


Mobile security, Vulnerabilities

Apple Patches iOS Flaw Exploitable by Malicious JPEG

October 26, 2016

Via: Threat Post

Apple on Monday patched a code execution vulnerability in iOS that could be exploited via a JPEG file crafted to take advantage of the flaw. Apple also issued its first round of patches for macOS Sierra as part of a […]


Cyber-crime, Malware

Magento card-swiping malware hides stolen card data in legitimate images

October 20, 2016

Via: Security Affairs

Security experts from Sucuri and RiskIQ have spotted an interesting exfiltration technique adopted by crooks to exfiltrate payment data from compromised e-commerce websites powered by the Magento platform. Cybercriminals have been using image files to store and exfiltrate payment card data […]


Malware

Which are principal cities hostages of malicious botnets?

October 7, 2016

Via: Security Affairs

It is not a mystery, there is a strict link between cybercrime and Geography. Cyber criminal organization used different tactics and offer different products depending on the country where they operate. Russian criminal communities specialize in the sale of payment card […]


Editorial, Malware, Vulnerabilities

How risky is macro malware, after all?

September 21, 2016

Via: Russel Edwards

Macro in computing represents a set of rules or patterns that match a certain input sequence to a specific output sequence, thus serving in automating software functions. They are essentially time-saving ways of launching repetitive tasks, and many organizations need […]


Malware

Businesses beware: New open source ransomware threatens the enterprise community

September 16, 2016

Via: TrendMicro Blog

While ransomware is nothing new for the business world, there are never-before-seen infection strains popping up nearly every day. As cyber-security experts work to bridge the gap between malicious threats and current protection practices, hackers are working just as hard […]


Network security

Spammers flood Inboxes with creative Pokémon Go offers

July 27, 2016

Via: Hot for Security

Everyone, and I mean everyone, is taking advantage of the Pokémon Go frenzy to lure people in their shops, on their websites and even at shady physical locations to mug unsuspecting players. And spammers make no exception as they bombard […]


Access control

Industrialisation of cybercrime is disrupting digital enterprises

July 7, 2016

Via: Help Net Security

Only a fifth of IT decision makers in large multinational corporations are confident that their organization is fully prepared against the threat of cybercriminals. The vast majority of companies feel constrained by regulation, available resources and a dependence on third […]


Hacker, Privacy protection

Servers of anonymous browsing network Tor designed to hack sites

July 7, 2016

Via: The Hill

The internet anonymity service Tor has some bad actors among its volunteer servers set to hack dark net websites. Northeastern University professor Guevara Noubir and his graduate student Amirali Sanatinia found the many of the volunteer-run servers making up the Tor network are […]


Cyber warfare

The Attribution Question: Does It Matter Who Attacked You?

June 30, 2016

Via: Dark Reading

Everyone will ask whodunnit, but how can an organization put that information to practical use during disaster recovery and planning for the future? In normal life crises, the jump to assess blame is often the emotional reaction, but rarely the […]