Blog Posts Tagged with "malware"

A98c8f7dbb46467b790e2ac1fbbd3f50

Understanding Endpoint Threat Diversification to Help Better Secure Infrastructures

December 14, 2017 Added by:Liviu Arsene

Threat diversification has enabled the development of new security technologies designed within layers, aimed at preventing advanced and sophisticated malware from breaching security at various attack stages.

Comments  (0)

3cf030edb83351856102235bcee85613

Healthcare Orgs in the Crosshairs: Ransomware Takes Aim

November 03, 2017 Added by:Sanjay Ramnath

Ransomware and other threats are not going away anytime soon and healthcare will continue to be a target for attackers. The hope is that healthcare professionals continue to keep IT security top of mind.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Managing Cyber Security in Today’s Ever-Changing World

October 26, 2017 Added by:Steve Durbin

The contours of cybercriminal enterprise have grown to become specialized, like that of mainstream business, operating out of conventional office spaces, providing a combination of customer support, marketing programs, product development, and other trappings of the traditional business world.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

Ztorg Trojan-SMS Infects Google Play Apps

June 24, 2017 Added by:Ionut Arghire

Newly discovered Google Play applications infected with the Ztorg Trojan family no longer request root privileges on compromised devices, Kaspersky Lab security researchers reveal.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

Neutrino Bot Gets Protective Loader

March 07, 2017 Added by:Ionut Arghire

A recently observed variant of the multi-purpose Neutrino Bot is using a protective, obfuscated loader that is an integral part of the full package.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

DynA-Crypt Ransomware Steals and Deletes User Data

February 11, 2017 Added by:Ionut Arghire

A newly observed piece of ransomware doesn’t merely focus on encrypting user’s files, but also attempts to steal data from the infected machine, and to delete files, researchers warn.

Comments  (0)

62a099b7cea20f00f6fb25ccd2b0dfa6

2017 Cybersecurity Trends Already in Action

February 08, 2017 Added by:Nathan Burke

With each passing year, it seems that newly-uncovered hacks and the number of users impacted grow larger and larger. One big prediction for 2017 that we haven’t seen come true yet is that we'll have a new major breach.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

Android Trojan Downloads Google Play Apps onto SD Cards

February 01, 2017 Added by:Ionut Arghire

A newly discovered Android Trojan can download applications from Google Play, but saves them onto the SD card instead of installing them, to keep this malicious activity hidden from the user.

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

Pokémon GO Security Threats Hit via Social Media

September 11, 2016 Added by:InfosecIsland News

Pokémon GO continues to remain a highly popular mobile app, and cybercriminals have found a new method of compromise by heading to social networks such as Facebook, Twitter, and Tumblr. A

Comments  (0)

Fa42af438e58b799189dd26386f5870f

LuaBot Linux Botnet Is Written in Lua Language

September 07, 2016 Added by:Ionut Arghire

A newly discovered Linux botnet that was coded using the Lua programming language is targeting Internet of Things (IoT) devices in addition to Linux systems and servers, researchers warn.

Comments  (0)

B261bfcc99f93249e275ddd135ffec57

Avoiding Ransomware with Strong Endpoint Security

May 26, 2016 Added by:Dean Dyche

Ransomware attacks are growing in volume and sophistication. To best defend against ransomware, users must ensure that their machines remain up to date with the latest patches and security updates.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

Nemucod Malware Downloader Evolves into Ransomware

April 26, 2016 Added by:Ionut Arghire

Nemucod, a previously known JavaScript malware family designed to download additional malicious software onto the compromised computers, has evolved into ransomware and is now using 7-Zip to encrypt its victims’ files.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

U.S. and Canada Issue Joint Alert on Ransomware

April 06, 2016 Added by:Ionut Arghire

Ransomware has recently become one of the biggest cyber threats to both end users and enterprises, and the United States DHS and the Canadian Cyber Incident Response Centre (CCIRC) have released a joint alert on ransomware threats.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

Security Pros Not Confident in Ability to Fight Ransomware

April 03, 2016 Added by:Ionut Arghire

Only 38 percent of security professionals are "very confident" in their company’s ability to successfully deal with the increasing ransomware threat, a new survey reveals.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

WordPress and Joomla Sites Hacked to Host Malicious JavaScript Code

April 03, 2016 Added by:Ionut Arghire

Over the past few months, hackers have been abusing popular JavaScript library jQuery to inject malicious scripts into the head sections of websites powered by WordPress and Joomla, Avast researchers say.

Comments  (0)

F08d1219500edcf01d8b56ee28634437

March Madness Security Threats Can Drive Any Organization Mad!

March 14, 2016 Added by:Mark Parker

Unfortunately, while the popularity of March Madness (the NCAA Basketball Tournament) has grown exponentially, nearly every facet of any employee’s involvement with the event could open up the employee, as well as the organization, to a number of cyber risks.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »