June 24, 2016
Via: Dark ReadingThe Necurs botnet associated with Dridex and Locky is back after three-week haitus. A botnet associated with the huge volumes of Dridex and Locky-laden emails in recent months has resumed operations after mysteriously going dark for three weeks. Researchers from […]
June 21, 2016
Via: MalwarebytesWe found a new piece of mobile malware, Android/Trojan.Pawost, that’s using Google Talk to make malicious calls. As soon as the malicious app is opened, a blank Google Talk icon pops up in the notifications of the mobile device. As […]
June 7, 2016
Via: MalwarebytesMalvertising isn’t only used to infect users via drive-by downloads or to deceitfully push fake software updates. A campaign currently going on via the TrafficHolder adult ad platform leverages the promise of raunchy videos to lure people into ad fraud. […]
June 2, 2016
Via: Naked SecuritySophosLabs just pointed out to us a new piece of ransomware with an interesting twist. It’s a virus! Most malware samples these days are what’s known as Trojans, short for “Trojan Horses” – programs that seem harmless on the surface, […]
May 11, 2016
Via: Russel EdwardsMetadata represents the context generated by and/or surrounding all digital communications, or the traces left by digital data during its processing and digital existence. Since it may be construed as a digital halo that reflects the characteristics of the user […]
April 12, 2016
Via: MalwarebytesRokku is yet another ransomware, discovered in recent weeks. Currently, it’s most common distribution method is spam where a malicious executable is dropped by a VB script belonging to the e-mail’s attachment. The building blocks of Rokku reminded us of the […]
March 25, 2016
Via: Security IntelligenceFor almost two decades, botnets have plagued our networks. Named by combining the words robot and network, a botnet is a network of computers that are infected with malicious software and remotely controlled by cyber-criminals known as botmasters. This task […]
March 22, 2016
Via: Help Net SecurityThe infamous Carbanak group is again doing what it does best: attacks and compromises financial institutions, and tries to steal as much money as possible from them by taking advantage of their victim payment processing networks, ATM networks and transaction […]
Editorial, Email security, Phishing
March 16, 2016
Via: Russel EdwardsLately many cyber-security online sources warned enterprises of the business email compromise scheme (also known as the BEC scam), and they do this for a good reason: this fraud method has spiked over the last few months. BEC attacks are […]
March 10, 2016
Via: Help Net SecurityAmong the things one can find with Shodan, the search engine for the Internet of Things, are trucks, buses and delivery vans that have been equipped with the Telematics Gateway Unit (TGU) device and a modem to connect to the […]
March 1, 2016
Via: Kaspersky BlogWe talk a lot about phishing and how dangerous it is. At times we feel like we may talk about it too much to where people simply say, “yeah, yeah. That will never happen to me, I am too smart […]
February 22, 2016
Via: Help Net SecurityFlashpoint released an annual research report that looks to uncover the growing complexity of illicit communities and the industrialization of cyber-crime over the past year. In the report, researchers highlight prolific trends that pose the greatest risk to organizations and […]
February 5, 2016
Via: MalwarebytesFrom the mailbox: a fake Amazon mail which attempts to persuade the lucky recipient that they have the chance to win £10 in return for completing a quick survey. The mail, titled “ΙD: 569369943” and claiming to be from “members support” / message@notice-amazon(dot)com, reads […]
February 4, 2016
Via: MalwarebytesSecurity company Sucuri recently noted a spike in WordPress infections, with a large number of sites getting injected with the same malicious scripts. Hacked websites are often used to host spam or perform malicious redirections to exploit kits and this case is […]
February 3, 2016
Via: Threat PostResearchers are warning that some visitors to eBay.com could be tricked into opening a page on the site that could expose them to phishing attacks and data theft. The vulnerability exists in the site’s online sales platform, according to Roman […]
January 26, 2016
Via: CIOYou already know not to click or tap on suspicious-looking links, but URL shorteners are making that a little more complicated today. Twitter users are passing around a shortened link that directs your browser to CrashSafari.com, a site that does […]
January 14, 2016
Via: MalwarebytesWe are all very familiar with URL shortening services, which are regularly used in Tweets and other social media. It is no secret that cyber criminals also use URL shorteners to aid them in achieving their objectives. URL shorteners are […]
December 7, 2015
Via: Help Net SecurityKaspersky Lab has spotted new attacks by the Sofacy group which make use of several upgraded techniques designed for aggressive persistency and greater invisibility of malicious activity in the attacked system. Sofacy (also known as “Fancy Bear,” “Sednit,” “STRONTIUM” and […]
December 4, 2015
Via: MalwarebytesRecently, two suspects were arrested for selling Cryptex Reborn and other FUD tools (helping to install malware in a Fully UnDetectable way). Today, we will study some examples to make sure that everyone knows what this type of tools are and […]
November 25, 2015
Via: Krebs on SecurityTwo months after KrebsOnSecurity first reported that multiple banks suspected a credit card breach at Hilton Hotel properties across the country, Hilton has acknowledged an intrusion involving malicious software found on some point-of-sale systems. According to a statement released after markets closed […]