September 6, 2017
Via: Krebs on SecurityIn early August 2017, FBI agents in Las Vegas arrested 23-year-old British security researcher Marcus Hutchins on suspicion of authoring and/or selling “Kronos,” a strain of malware designed to steal online banking credentials. Hutchins was virtually unknown to most in […]
September 5, 2017
Via: Help Net SecurityLocky ransomware is back, again, delivered with the help of new tricks to fool users and anti-malware defenses. Massive spam campaign Delivered through one of the largest spam campaigns in H2 2017 – as many as 23 million sent messages […]
January 13, 2017
Via: Naked SecurityBe careful what you click: There’s a new phishing scam hitting Amazon listings that look like legitimate deals, offering great prices on “used – like new” electronics. If you click these links on Amazon, you’ll be redirected to a very […]
January 12, 2017
Via: MalwarebytesAd fraud is one of many issues that contribute to the ad industry’s negative image these days. Unlike malvertising which affects end users by infecting them with malware, ad fraud costs advertisers billions of dollars in adverts that were never […]
January 6, 2017
Via: Naked SecurityIt’s still the first week of 2017, and we’ve already had a WhatsApp scam warning from a keen Naked Security reader. This one tries to draw you in by claiming you’ll get free Wi-Fi service, promising to keep you connected […]
December 9, 2016
Via: Symantec ConnectMalicious PowerShell scripts are on the rise, as attackers are using the framework’s flexibility to download their payloads, traverse through a compromised network, and carry out reconnaissance. Symantec analyzed PowerShell malware samples to find out how much of a danger […]
December 8, 2016
Via: SC MagazineFile this one in the “Irony” department: Threat actors have been discovered trying to infect security-minded individuals with a Trojan downloader by sending spear phishing emails that offer free invitations to Palo Alto Networks’ Nov. 3 Cyber Security Summit in Jakarta, Indonesia. […]
November 23, 2016
Via: Security WeekDistributed via spam emails pretending to be complaints from an Internet Service Provider (ISP), a newly observed Locky ransomware variant appends the .AESIR extension to the encrypted files, security researchers reveal. Ever since it first emerged in February of this […]
November 17, 2016
Via: Threat PostThe Carbanak cybercrime gang, best known for allegedly stealing $1 billion from financial institutions worldwide, have shifted strategy and are targeting the hospitality and restaurant industries with new techniques and malware. According to security researchers at Trustwave, over the last […]
Access control, Mobile security
November 7, 2016
Via: We Live SecurityLooking at the multitude of different types of SMS users out there, there is a very high probability that there is someone who wants to read or gain access to another user’s SMS messages. What kind of SMS client is […]
October 31, 2016
Via: We Live SecurityNearly half a century ago, history was made with the ‘successful’ transmission of data between two computers in California. The letters ‘lo’ were sent – it should have been the world ‘login’, but that’s a moot point – establishing the basis […]
Mobile security, Vulnerabilities
October 26, 2016
Via: Threat PostApple on Monday patched a code execution vulnerability in iOS that could be exploited via a JPEG file crafted to take advantage of the flaw. Apple also issued its first round of patches for macOS Sierra as part of a […]
October 20, 2016
Via: Security AffairsSecurity experts from Sucuri and RiskIQ have spotted an interesting exfiltration technique adopted by crooks to exfiltrate payment data from compromised e-commerce websites powered by the Magento platform. Cybercriminals have been using image files to store and exfiltrate payment card data […]
October 7, 2016
Via: Security AffairsIt is not a mystery, there is a strict link between cybercrime and Geography. Cyber criminal organization used different tactics and offer different products depending on the country where they operate. Russian criminal communities specialize in the sale of payment card […]
Editorial, Malware, Vulnerabilities
September 21, 2016
Via: Russel EdwardsMacro in computing represents a set of rules or patterns that match a certain input sequence to a specific output sequence, thus serving in automating software functions. They are essentially time-saving ways of launching repetitive tasks, and many organizations need […]
September 16, 2016
Via: TrendMicro BlogWhile ransomware is nothing new for the business world, there are never-before-seen infection strains popping up nearly every day. As cyber-security experts work to bridge the gap between malicious threats and current protection practices, hackers are working just as hard […]
July 27, 2016
Via: Hot for SecurityEveryone, and I mean everyone, is taking advantage of the Pokémon Go frenzy to lure people in their shops, on their websites and even at shady physical locations to mug unsuspecting players. And spammers make no exception as they bombard […]
July 7, 2016
Via: Help Net SecurityOnly a fifth of IT decision makers in large multinational corporations are confident that their organization is fully prepared against the threat of cybercriminals. The vast majority of companies feel constrained by regulation, available resources and a dependence on third […]
July 7, 2016
Via: The HillThe internet anonymity service Tor has some bad actors among its volunteer servers set to hack dark net websites. Northeastern University professor Guevara Noubir and his graduate student Amirali Sanatinia found the many of the volunteer-run servers making up the Tor network are […]
June 30, 2016
Via: Dark ReadingEveryone will ask whodunnit, but how can an organization put that information to practical use during disaster recovery and planning for the future? In normal life crises, the jump to assess blame is often the emotional reaction, but rarely the […]