Items Tagged with "malware"


306708aaf995cf6a77d3083885b60907

Indicators of Compromise for Malware Used by Sony Attackers

December 21, 2014 Added by:Mike Lennon

Indicators of Compromise (IOCs) related to the Sony cyberattack that should be added to network security solutions to determine whether they are present on a network.

Comments  (2)

Ffc4103a877b409fd8d6da8f854f617e

Regin: A Malicious Platform Capable Of Spying on GSM Networks

November 25, 2014 Added by:InfosecIsland News

Kaspersky Lab's Global Research and Analysis Team has published its research on Regin - the first cyber-attack platform known to penetrate and monitor GSM networks in addition to other "standard" spying tasks.

Comments  (3)

306708aaf995cf6a77d3083885b60907

Kmart Says Hackers Breached Payment System

October 10, 2014 Added by:Mike Lennon

Kmart is the latest large U.S. retailer to experience a breach of its payment systems, joining a fast growing club dealing successful hack attacks that have resulted in the exposure of customer data and payment card information.

Comments  (0)

Af7244bb99debb4a1152fa49a993a05c

Cybercriminals Use Patriotic Russians to Revive Kelihos Botnet

August 30, 2014 Added by:Eduard Kovacs

Cybercriminals seem to be well aware that many Russian nationals are unhappy with the sanctions imposed by foreign governments against their country, so they're relying on them to revive the Kelihos (Waledac) botnet

Comments  (0)

Ffc4103a877b409fd8d6da8f854f617e

Webcast: Detecting and Preventing Advanced Persistent Threats

July 08, 2014 Added by:InfosecIsland News

Please join Palo Alto Networks and SecurityWeek on Wednesday, July 9th at 1:00 PM ET for an informative webcast on how your organization can better detect and prevent advanced cyber attacks.

Comments  (0)

094983f35f079e5bd15fdc2f9ce9297c

ZeroAccess – The Sleeping Threat

February 20, 2014 Added by:Edward Jones

ZeroAccess, also known as Sirefef, is one of the most robust and durable botnets in recent history. It was first discovered back in July 2011 and has since infected almost 2 million Windows computers all over the world and cost online advertisers over £1.6 million each month through fraudulent clicks!

Comments  (0)

21bc599fa4dd7ac5d5367f4398458adc

How Target's Point-of-Sale System May Have Been Hacked

January 16, 2014 Added by:Ken Westin

Target has not revealed much regarding how their massive data breach occurred. The question we are all asking is how is it that all the point-of-sale systems across all Target stores in the United States were compromised at the same time?

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

How The NSA Deploys Malware: An In-Depth Look at the New Revelations

October 08, 2013 Added by:Electronic Frontier Foundation

The template for attacking people with malware used by the NSA is in widespread use by criminals and fraudsters, as well as foreign intelligence agencies, so it's important to understand and defend against this threat to avoid being a victim to the plethora of attackers out there.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Building OS X Trojans With AppleScript, Homoglyphs and iTunes

September 21, 2013 Added by:Tripwire Inc

A year or so ago I stumbled upon a way to create Trojans for OS X by utilizing homoglyphs and a bit of social engineering, I disclosed the vulnerability to Apple and presented it at ToorCamp.

Comments  (1)

Ffc4103a877b409fd8d6da8f854f617e

Kaspersky Uncovers Active Cyber-Espionage Attacks Targeting South Korean Think-Tanks

September 11, 2013 Added by:InfosecIsland News

Kaspersky Lab has uncovered details of an ongoing cyber-espionage campaign targeting South Korean think tanks.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Carberp Botnet Lifecycle Infographic

July 02, 2013 Added by:Tripwire Inc

Carberp is sophisticated, modular and persistent malware utilizing advanced obfuscation techniques to evade detection, removal and the ability to disable anti-virus. It also offers malware developers the ability to customize the malicious package statically as well as dynamically via a remote command and control server.

Comments  (4)

A58bf865b185e0e3f665473bf8f3ca6d

Mobile Security Processes Could Be Applied to Medical Devices: Bluebox

May 10, 2013 Added by:Steve Ragan

Before malware could become a threat to medical devices, Adam Ely said attackers would have to write malware specifically targeted to these devices and organizations; or the devices would have to adopt a standard platforms and software.

Comments  (8)

36317a78f97d1d6d7a02333ad01186fa

New Approaches for Blocking Zero-Day Exploits to Prevent APTs

April 16, 2013 Added by:George Tubin

Cybercriminals continue to develop new methods to bypass security controls in order to install malware on corporate endpoints. An endpoint protection approach that provides both effectiveness and manageability must begin with an understanding of the attack vectors that require mitigation.

Comments  (2)

Default-avatar

New Malware Targets POS Systems and ATMs, Hits Major US Banks

March 27, 2013 Added by:Infosec Island

A new malware targeting point-of-sale (POS) systems and ATMs has stolen payment card information from several US banks, researchers say. The author behind the malware appears to have links to a Russian cyber-crime gang.

Comments  (0)

Da3ca2c61c4790bcbd81ebf28318d10a

Из России с любовью - "From Russia With Love"

March 15, 2013 Added by:Krypt3ia

A site popped up with the domain name exposed.su and within the pages (other than malware lurking for an IE exploit) sits all kinds of personal financial data for famous people. Among the people hit on this site were the likes of Hillary Clinton, Al Gore, FBI Director Mueller and others.

Comments  (1)

Default-avatar

New York Times Attacks Show Need For New Security Defenses

February 01, 2013 Added by:Infosec Island

The recent attacks against the New York Times allegedly carried out by the Chinese military highlight the importance of layered security to protect sensitive systems and data.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »