Blog Posts Tagged with "malware"

Fa42af438e58b799189dd26386f5870f

Neutrino Bot Gets Protective Loader

March 07, 2017 Added by:Ionut Arghire

A recently observed variant of the multi-purpose Neutrino Bot is using a protective, obfuscated loader that is an integral part of the full package.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

DynA-Crypt Ransomware Steals and Deletes User Data

February 11, 2017 Added by:Ionut Arghire

A newly observed piece of ransomware doesn’t merely focus on encrypting user’s files, but also attempts to steal data from the infected machine, and to delete files, researchers warn.

Comments  (0)

62a099b7cea20f00f6fb25ccd2b0dfa6

2017 Cybersecurity Trends Already in Action

February 08, 2017 Added by:Nathan Burke

With each passing year, it seems that newly-uncovered hacks and the number of users impacted grow larger and larger. One big prediction for 2017 that we haven’t seen come true yet is that we'll have a new major breach.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

Android Trojan Downloads Google Play Apps onto SD Cards

February 01, 2017 Added by:Ionut Arghire

A newly discovered Android Trojan can download applications from Google Play, but saves them onto the SD card instead of installing them, to keep this malicious activity hidden from the user.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

Pokémon GO Security Threats Hit via Social Media

September 11, 2016 Added by:InfosecIsland News

Pokémon GO continues to remain a highly popular mobile app, and cybercriminals have found a new method of compromise by heading to social networks such as Facebook, Twitter, and Tumblr. A

Comments  (0)

Fa42af438e58b799189dd26386f5870f

LuaBot Linux Botnet Is Written in Lua Language

September 07, 2016 Added by:Ionut Arghire

A newly discovered Linux botnet that was coded using the Lua programming language is targeting Internet of Things (IoT) devices in addition to Linux systems and servers, researchers warn.

Comments  (0)

B261bfcc99f93249e275ddd135ffec57

Avoiding Ransomware with Strong Endpoint Security

May 26, 2016 Added by:Dean Dyche

Ransomware attacks are growing in volume and sophistication. To best defend against ransomware, users must ensure that their machines remain up to date with the latest patches and security updates.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

Nemucod Malware Downloader Evolves into Ransomware

April 26, 2016 Added by:Ionut Arghire

Nemucod, a previously known JavaScript malware family designed to download additional malicious software onto the compromised computers, has evolved into ransomware and is now using 7-Zip to encrypt its victims’ files.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

U.S. and Canada Issue Joint Alert on Ransomware

April 06, 2016 Added by:Ionut Arghire

Ransomware has recently become one of the biggest cyber threats to both end users and enterprises, and the United States DHS and the Canadian Cyber Incident Response Centre (CCIRC) have released a joint alert on ransomware threats.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

Security Pros Not Confident in Ability to Fight Ransomware

April 03, 2016 Added by:Ionut Arghire

Only 38 percent of security professionals are "very confident" in their company’s ability to successfully deal with the increasing ransomware threat, a new survey reveals.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

WordPress and Joomla Sites Hacked to Host Malicious JavaScript Code

April 03, 2016 Added by:Ionut Arghire

Over the past few months, hackers have been abusing popular JavaScript library jQuery to inject malicious scripts into the head sections of websites powered by WordPress and Joomla, Avast researchers say.

Comments  (0)

F08d1219500edcf01d8b56ee28634437

March Madness Security Threats Can Drive Any Organization Mad!

March 14, 2016 Added by:Mark Parker

Unfortunately, while the popularity of March Madness (the NCAA Basketball Tournament) has grown exponentially, nearly every facet of any employee’s involvement with the event could open up the employee, as well as the organization, to a number of cyber risks.

Comments  (0)

69fd9498e442aafd4eb04dfdfdf245c6

The Age of Advanced Threats Has Arrived

January 15, 2016 Added by:Luis Corrons

The most capable defense solutions must not only be centralized, but also be able to automatically block, identify, forensically profile and purge malware, even when it is veiled by legitimate programs and processes. The software needs to be smarter than the malware itself.

Comments  (0)

306708aaf995cf6a77d3083885b60907

Indicators of Compromise for Malware Used by Sony Attackers

December 21, 2014 Added by:Mike Lennon

Indicators of Compromise (IOCs) related to the Sony cyberattack that should be added to network security solutions to determine whether they are present on a network.

Comments  (2)

Ffc4103a877b409fd8d6da8f854f617e

Regin: A Malicious Platform Capable Of Spying on GSM Networks

November 25, 2014 Added by:InfosecIsland News

Kaspersky Lab's Global Research and Analysis Team has published its research on Regin - the first cyber-attack platform known to penetrate and monitor GSM networks in addition to other "standard" spying tasks.

Comments  (3)

306708aaf995cf6a77d3083885b60907

Kmart Says Hackers Breached Payment System

October 10, 2014 Added by:Mike Lennon

Kmart is the latest large U.S. retailer to experience a breach of its payment systems, joining a fast growing club dealing successful hack attacks that have resulted in the exposure of customer data and payment card information.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »