Advertisement
Top

Tag: Threats & Malware


Threats & Malware, Virus & Malware

Associated Eye Care Discloses Impact From 2020 Netgain Ransomware Attack

July 11, 2022

Via: Security Week

In November 2020, Netgain, a provider of managed IT services to several industries, fell victim to a ransomware attack that impacted numerous organizations in the healthcare sector, all of which were informed of the incident by January 2021. AEC, which […]


Threats & Malware, Virus & Malware

Hermit spyware is deployed with the help of a victim’s ISP

June 29, 2022

Via: Malwarebytes

Google’s Threat Analysis Group (TAG) has revealed a sophisticated spyware activity involving ISPs (internet service providers) aiding in downloading powerful commercial spyware onto users’ mobile devices. The spyware, dubbed Hermit, is reported to have government clients much like Pegasus. Italian […]


Editorial

VPN Best Practices for Supporting Your Teleworkers

August 29, 2020

Via: Natalie Dunn

The COVID-19 pandemic shook the business world to the core since restrictions and mandatory public health measures forced employees to work from home. As lockdowns ended, more and more businesses started to rethink in-office perks and extend their work-from-home arrangements. […]


Vulnerabilities

Defend encrypted data from quantum computer threat

April 29, 2016

Via: Help Net Security

If an exotic quantum computer is invented that could break the codes we depend on to protect confidential electronic information, what will we do to maintain our security and privacy? That’s the overarching question posed by a new report from […]


Cyber warfare

U.S. cyberwar against ISIS could use methods and tactics criminals use against enterprises

April 28, 2016

Via: CSO Online

Cyberwar against ISIS could bring into play tools and tactics that corporate security pros face every day, only this time they will be used as part of a larger objective than criminal profit. The goals of the offensive are to […]


Application security

Fake LastPass extension exposes users to ads and installs

April 27, 2016

Via: Malwarebytes

When it comes to passwords, one piece of advice we give our readers is to use password managers / vaults to help them maintain, keep track of, and store away account logins that are impossible to recall by memory on […]


Hacker, Threats & Malware

Bangladesh Bank hackers compromised SWIFT software with bespoke malware

April 26, 2016

Via: Help Net Security

Bit by bit, indications about how the attackers who targeted Bangladesh’s central bank managed to take off with some $80 milllion (of the nearly $1 billion they aimed for) via fraudulent transfers are coming to light. First it was established […]


Threats & Malware, Virus & Malware

Exploit kit targets Android devices, delivers ransomware

April 26, 2016

Via: Help Net Security

Ransomware hitting mobile devices is not nearly as widespread as that which targets computers, but Blue Coat researchers have discovered something even less common: mobile ransomware delivered via exploit kit. The ransomware in question calls itself Cyber.Police (the researchers have […]


Access control

Worldwide IoT security spending on the rise

April 26, 2016

Via: Help Net Security

Worldwide spending on Internet of Things security will reach $348 million in 2016, a 23.7 percent increase from 2015 spending of $281.5 million, according to Gartner. Furthermore, spending on IoT security is expected to reach $547 million in 2018. “It’s […]


Vulnerabilities

Cisco Patches Severe Flaws

April 25, 2016

Via: InfoSecurity Live

Cisco has released software updates to patch several critical and high severity denial-of-service (DoS) vulnerabilities in the company’s Wireless LAN Controller (WLC) products. The most serious of the flaws, rated critical, is an issue related to the HTTP URL redirect […]


Network security

Attackers opt for discreet methods to spy inside the network

April 25, 2016

Via: Help Net Security

For its latest report, Vectra analyzed data from 120 customer networks comprised of more than 1.3 million hosts over the first quarter of 2016. All organizations showed signs of targeted attacks including internal reconnaissance, lateral movement or data exfiltration. Of […]


Threats & Malware

Google will block extensions that try to deceptively install themselves on your browser

August 27, 2015

Via: threats-and-malware

Surely this has happened to you before: you’re browsing online and you come across a blog or website that has a plugin for Chrome that you think looks interesting or useful. You check out the developer’s website, have a look […]


Threats & Malware

MITRE Matrix: Going on the ATT&CK

August 19, 2015

Via: threats-and-malware

Most cybersecurity work is geared towards finding ways to prevent intrusions – passwords, two-factor authentication, firewalls, to name a few – and to identify the “chinks in the armor” that need to be sealed. The characteristics of malware are shared […]


Threats & Malware

Design flaw in Intel processors opens door to rootkits, researcher says

August 7, 2015

Via: threats-and-malware

A design #flaw in the x86-#processor #architecture dating back almost two decades could allow attackers to install a #rootkit in the low-level firmware of computers, a security researcher said Thursday. Such malware could be undetectable by security products. The vulnerability […]


Threats & Malware

The Rush for Windows 10 Infects PCs with Spy Trojan

August 5, 2015

Via: threats-and-malware

Due to the high demand for Windows 10, Microsoft is releasing it gradually. This especially applies to certain countries. The official Microsoft Brazil website confirms it (left image). Cybercriminals from Brazil have taken advantage of this and are running a […]


Threats & Malware

Report delves into RAT videos on YouTube

August 2, 2015

Via: threats-and-malware

Of all the malware online, Remote Access Trojans (RATs) account for nearly 70 percent. A new report from Digital Citizens Alliance, a self-described coalition focused on internet threats, deep dives into the RATs world with a particular focus on YouTube. […]


Threats & Malware

Tapjacking – when the danger camouflages itself on Google Play

July 20, 2015

Via: threats-and-malware

After many attempts, we have finally gotten it into our heads that it is essential that we read the small print before we install any application on our devices. If it mentions anything that strays far from what the app […]


Threats & Malware

The arsenal of SMS scammers, spammers and fraudsters

July 17, 2015

Via: threats-and-malware

Illicit commercial activity online has manifested into all things mobile. With revenue in the billions from mobile marketing, criminals are doing their best to harness the technology for their own monetary gain. Monetisable triggers that come from pay for performance […]


Threats & Malware

180 Million Windows XP Users Exposed to Threats as Microsoft Stops All Security Updates

July 16, 2015

Via: threats-and-malware

Microsoft has announced that, as of July 15, all security solutions for XP users will stop receiving updates, leaving users exposed to threats. Windows XP will no longer provide the Malicious Software Removal Tool or updates to Microsoft Security Essentials. […]


Threats & Malware

Evans Hotels announces payment card incident involving malware

July 12, 2015

Via: threats-and-malware

California-based Evans Hotels – which operates Bahia Resort Hotel, Catamaran Resort Hotel and Spa, and The Lodge at Torrey Pines – announced that malware was installed on computers at the front desks of its properties that could have compromised payment […]