Blog Posts Tagged with "malware"

Fa42af438e58b799189dd26386f5870f

LuaBot Linux Botnet Is Written in Lua Language

September 07, 2016 Added by:Ionut Arghire

A newly discovered Linux botnet that was coded using the Lua programming language is targeting Internet of Things (IoT) devices in addition to Linux systems and servers, researchers warn.

Comments  (0)

B261bfcc99f93249e275ddd135ffec57

Avoiding Ransomware with Strong Endpoint Security

May 26, 2016 Added by:Dean Dyche

Ransomware attacks are growing in volume and sophistication. To best defend against ransomware, users must ensure that their machines remain up to date with the latest patches and security updates.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

Nemucod Malware Downloader Evolves into Ransomware

April 26, 2016 Added by:Ionut Arghire

Nemucod, a previously known JavaScript malware family designed to download additional malicious software onto the compromised computers, has evolved into ransomware and is now using 7-Zip to encrypt its victims’ files.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

U.S. and Canada Issue Joint Alert on Ransomware

April 06, 2016 Added by:Ionut Arghire

Ransomware has recently become one of the biggest cyber threats to both end users and enterprises, and the United States DHS and the Canadian Cyber Incident Response Centre (CCIRC) have released a joint alert on ransomware threats.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

Security Pros Not Confident in Ability to Fight Ransomware

April 03, 2016 Added by:Ionut Arghire

Only 38 percent of security professionals are "very confident" in their company’s ability to successfully deal with the increasing ransomware threat, a new survey reveals.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

WordPress and Joomla Sites Hacked to Host Malicious JavaScript Code

April 03, 2016 Added by:Ionut Arghire

Over the past few months, hackers have been abusing popular JavaScript library jQuery to inject malicious scripts into the head sections of websites powered by WordPress and Joomla, Avast researchers say.

Comments  (0)

F08d1219500edcf01d8b56ee28634437

March Madness Security Threats Can Drive Any Organization Mad!

March 14, 2016 Added by:Mark Parker

Unfortunately, while the popularity of March Madness (the NCAA Basketball Tournament) has grown exponentially, nearly every facet of any employee’s involvement with the event could open up the employee, as well as the organization, to a number of cyber risks.

Comments  (0)

69fd9498e442aafd4eb04dfdfdf245c6

The Age of Advanced Threats Has Arrived

January 15, 2016 Added by:Luis Corrons

The most capable defense solutions must not only be centralized, but also be able to automatically block, identify, forensically profile and purge malware, even when it is veiled by legitimate programs and processes. The software needs to be smarter than the malware itself.

Comments  (0)

306708aaf995cf6a77d3083885b60907

Indicators of Compromise for Malware Used by Sony Attackers

December 21, 2014 Added by:Mike Lennon

Indicators of Compromise (IOCs) related to the Sony cyberattack that should be added to network security solutions to determine whether they are present on a network.

Comments  (2)

Ffc4103a877b409fd8d6da8f854f617e

Regin: A Malicious Platform Capable Of Spying on GSM Networks

November 25, 2014 Added by:InfosecIsland News

Kaspersky Lab's Global Research and Analysis Team has published its research on Regin - the first cyber-attack platform known to penetrate and monitor GSM networks in addition to other "standard" spying tasks.

Comments  (3)

306708aaf995cf6a77d3083885b60907

Kmart Says Hackers Breached Payment System

October 10, 2014 Added by:Mike Lennon

Kmart is the latest large U.S. retailer to experience a breach of its payment systems, joining a fast growing club dealing successful hack attacks that have resulted in the exposure of customer data and payment card information.

Comments  (0)

Af7244bb99debb4a1152fa49a993a05c

Cybercriminals Use Patriotic Russians to Revive Kelihos Botnet

August 30, 2014 Added by:Eduard Kovacs

Cybercriminals seem to be well aware that many Russian nationals are unhappy with the sanctions imposed by foreign governments against their country, so they're relying on them to revive the Kelihos (Waledac) botnet

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

Webcast: Detecting and Preventing Advanced Persistent Threats

July 08, 2014 Added by:InfosecIsland News

Please join Palo Alto Networks and SecurityWeek on Wednesday, July 9th at 1:00 PM ET for an informative webcast on how your organization can better detect and prevent advanced cyber attacks.

Comments  (0)

094983f35f079e5bd15fdc2f9ce9297c

ZeroAccess – The Sleeping Threat

February 20, 2014 Added by:Edward Jones

ZeroAccess, also known as Sirefef, is one of the most robust and durable botnets in recent history. It was first discovered back in July 2011 and has since infected almost 2 million Windows computers all over the world and cost online advertisers over £1.6 million each month through fraudulent clicks!

Comments  (0)

21bc599fa4dd7ac5d5367f4398458adc

How Target's Point-of-Sale System May Have Been Hacked

January 16, 2014 Added by:Ken Westin

Target has not revealed much regarding how their massive data breach occurred. The question we are all asking is how is it that all the point-of-sale systems across all Target stores in the United States were compromised at the same time?

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

How The NSA Deploys Malware: An In-Depth Look at the New Revelations

October 08, 2013 Added by:Electronic Frontier Foundation

The template for attacking people with malware used by the NSA is in widespread use by criminals and fraudsters, as well as foreign intelligence agencies, so it's important to understand and defend against this threat to avoid being a victim to the plethora of attackers out there.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »