Blog Posts Tagged with "malware"

Fa42af438e58b799189dd26386f5870f

U.S. and Canada Issue Joint Alert on Ransomware

April 06, 2016 Added by:Ionut Arghire

Ransomware has recently become one of the biggest cyber threats to both end users and enterprises, and the United States DHS and the Canadian Cyber Incident Response Centre (CCIRC) have released a joint alert on ransomware threats.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

Security Pros Not Confident in Ability to Fight Ransomware

April 03, 2016 Added by:Ionut Arghire

Only 38 percent of security professionals are "very confident" in their company’s ability to successfully deal with the increasing ransomware threat, a new survey reveals.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

WordPress and Joomla Sites Hacked to Host Malicious JavaScript Code

April 03, 2016 Added by:Ionut Arghire

Over the past few months, hackers have been abusing popular JavaScript library jQuery to inject malicious scripts into the head sections of websites powered by WordPress and Joomla, Avast researchers say.

Comments  (0)

F08d1219500edcf01d8b56ee28634437

March Madness Security Threats Can Drive Any Organization Mad!

March 14, 2016 Added by:Mark Parker

Unfortunately, while the popularity of March Madness (the NCAA Basketball Tournament) has grown exponentially, nearly every facet of any employee’s involvement with the event could open up the employee, as well as the organization, to a number of cyber risks.

Comments  (0)

69fd9498e442aafd4eb04dfdfdf245c6

The Age of Advanced Threats Has Arrived

January 15, 2016 Added by:Luis Corrons

The most capable defense solutions must not only be centralized, but also be able to automatically block, identify, forensically profile and purge malware, even when it is veiled by legitimate programs and processes. The software needs to be smarter than the malware itself.

Comments  (0)

306708aaf995cf6a77d3083885b60907

Indicators of Compromise for Malware Used by Sony Attackers

December 21, 2014 Added by:Mike Lennon

Indicators of Compromise (IOCs) related to the Sony cyberattack that should be added to network security solutions to determine whether they are present on a network.

Comments  (2)

Ffc4103a877b409fd8d6da8f854f617e

Regin: A Malicious Platform Capable Of Spying on GSM Networks

November 25, 2014 Added by:InfosecIsland News

Kaspersky Lab's Global Research and Analysis Team has published its research on Regin - the first cyber-attack platform known to penetrate and monitor GSM networks in addition to other "standard" spying tasks.

Comments  (3)

306708aaf995cf6a77d3083885b60907

Kmart Says Hackers Breached Payment System

October 10, 2014 Added by:Mike Lennon

Kmart is the latest large U.S. retailer to experience a breach of its payment systems, joining a fast growing club dealing successful hack attacks that have resulted in the exposure of customer data and payment card information.

Comments  (0)

Af7244bb99debb4a1152fa49a993a05c

Cybercriminals Use Patriotic Russians to Revive Kelihos Botnet

August 30, 2014 Added by:Eduard Kovacs

Cybercriminals seem to be well aware that many Russian nationals are unhappy with the sanctions imposed by foreign governments against their country, so they're relying on them to revive the Kelihos (Waledac) botnet

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

Webcast: Detecting and Preventing Advanced Persistent Threats

July 08, 2014 Added by:InfosecIsland News

Please join Palo Alto Networks and SecurityWeek on Wednesday, July 9th at 1:00 PM ET for an informative webcast on how your organization can better detect and prevent advanced cyber attacks.

Comments  (0)

094983f35f079e5bd15fdc2f9ce9297c

ZeroAccess – The Sleeping Threat

February 20, 2014 Added by:Edward Jones

ZeroAccess, also known as Sirefef, is one of the most robust and durable botnets in recent history. It was first discovered back in July 2011 and has since infected almost 2 million Windows computers all over the world and cost online advertisers over £1.6 million each month through fraudulent clicks!

Comments  (0)

21bc599fa4dd7ac5d5367f4398458adc

How Target's Point-of-Sale System May Have Been Hacked

January 16, 2014 Added by:Ken Westin

Target has not revealed much regarding how their massive data breach occurred. The question we are all asking is how is it that all the point-of-sale systems across all Target stores in the United States were compromised at the same time?

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

How The NSA Deploys Malware: An In-Depth Look at the New Revelations

October 08, 2013 Added by:Electronic Frontier Foundation

The template for attacking people with malware used by the NSA is in widespread use by criminals and fraudsters, as well as foreign intelligence agencies, so it's important to understand and defend against this threat to avoid being a victim to the plethora of attackers out there.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Building OS X Trojans With AppleScript, Homoglyphs and iTunes

September 21, 2013 Added by:Tripwire Inc

A year or so ago I stumbled upon a way to create Trojans for OS X by utilizing homoglyphs and a bit of social engineering, I disclosed the vulnerability to Apple and presented it at ToorCamp.

Comments  (1)

Ffc4103a877b409fd8d6da8f854f617e

Kaspersky Uncovers Active Cyber-Espionage Attacks Targeting South Korean Think-Tanks

September 11, 2013 Added by:InfosecIsland News

Kaspersky Lab has uncovered details of an ongoing cyber-espionage campaign targeting South Korean think tanks.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Carberp Botnet Lifecycle Infographic

July 02, 2013 Added by:Tripwire Inc

Carberp is sophisticated, modular and persistent malware utilizing advanced obfuscation techniques to evade detection, removal and the ability to disable anti-virus. It also offers malware developers the ability to customize the malicious package statically as well as dynamically via a remote command and control server.

Comments  (4)

Page « < 1 - 2 - 3 - 4 - 5 > »