Quantcast
Channel: Malicious – DataProtectionCenter.com – Tech and Security
Browsing latest articles
Browse All 126 View Live

Image may be NSFW.
Clik here to view.

How to explore the Internet safely on your iPad and iPhone

It’s true not much malware exists in the wild for MacOS or iOS. But there is some — and phishing sites, spammers, and carders don’t discriminate on the basis of operating system. To protect you from...

View Article



Image may be NSFW.
Clik here to view.

White House extends state of emergency for cyber threats

President Trump will continue a 2015 state of national emergency that President Obama used as a basis for freezing the assets of Russians tied to a hacking campaign aimed at disrupting the...

View Article

Image may be NSFW.
Clik here to view.

Millions of websites affected by unpatched flaw in Microsoft IIS 6 web server

A proof-of-concept exploit has been published for an unpatched vulnerability in Microsoft Internet Information Services 6.0, a version of the web server that’s no longer supported but still widely...

View Article

Image may be NSFW.
Clik here to view.

Latest WikiLeaks dump exposes CIA methods to mask malware

WikiLeaks may have dealt another blow to the CIA’s hacking operations by releasing files that allegedly show how the agency was masking its malware attacks. On Friday, the site dumped the source code...

View Article

Image may be NSFW.
Clik here to view.

Three ways to rob an ATM: Remote, almost remote, and physical

You might’ve noticed that we are fond of theft by ATM. No, we don’t hack them ourselves, but whenever someone else does, we jump right on the case. At SAS 2017, the main cybersecurity event of the...

View Article


Image may be NSFW.
Clik here to view.

Clever Physical ATM Attack

This is an interesting combination of computer and physical attack: Researchers from the Russian security firm Kaspersky on Monday detailed a new ATM-emptying attack, one that mixes digital savvy with...

View Article

Image may be NSFW.
Clik here to view.

F-Secure buys Little Flocker to combat macOS ransomware

With attacks against Mac users growing in number and sophistication, endpoint security vendor F-Secure has decided to acquire Little Flocker, a macOS application that provides behavior-based...

View Article

Image may be NSFW.
Clik here to view.

Samsung’s squashing of malicious Tizen smart TV bugs is turning messy

After 40 critical vulnerabilities on Samsung’s Tizen — used in smart TVs and smartwatches — were exposed this week by Israeli researcher Amihai Neiderman, the company is scrambling to patch them. But...

View Article


Image may be NSFW.
Clik here to view.

A vigilante hacker may have built a computer worm to protect the IoT

Is a vigilante hacker trying to secure your IoT device from malware? The mysterious developer behind a growing computer worm wants people to think so. The worm, known as Hajime, has infected tens of...

View Article


Image may be NSFW.
Clik here to view.

Hackers use old Stuxnet-related bug to carry out attacks

Users that run unpatched software beware. Hackers have been relying on an old software bug tied to the Stuxnet worm to carry out their attacks. Microsoft may have initially patched the flaw in 2010,...

View Article

Image may be NSFW.
Clik here to view.

No Fix for SquirrelMail Remote Code Execution Vulnerability

The PHP-based webmail package SquirrelMail suffers from a remote code execution vulnerability that could let attackers execute arbitrary commands on the target and compromise the system. Dawid...

View Article

Image may be NSFW.
Clik here to view.

Ransomware attacks are taking a greater toll on victim’s wallets

The hackers spreading ransomware are getting greedier. In 2016, the average ransom demand to free computers hit with the infection rose to US$1,077, up from $294 the year before, according to security...

View Article

Image may be NSFW.
Clik here to view.

Ransomware, Cyberespionage Dominate Verizon DBIR

Ransomware dominated malware-related data breaches investigated by Verizon last year, appearing in 71 percent of cases, according to the annual Verizon Data Breach Investigations Report (DBIR)...

View Article


Image may be NSFW.
Clik here to view.

Will fileless malware push the antivirus industry into oblivion?

The death of antivirus has been prophesied for years now, but the AV industry is still alive and kicking. SentinelOne, though, believes that in-memory resident attacks, i.e. fileless malware, just...

View Article

Image may be NSFW.
Clik here to view.

Vanilla Forums Open Source Software Vulnerable to RCE, Host Header Injection...

Popular open source forum software suffers from vulnerabilities that could let an attacker gain access to user accounts, carry out web-cache poisoning attacks, and in some instances, execute arbitrary...

View Article


Image may be NSFW.
Clik here to view.

IT threat evolution Q1 2017. Statistics

According to KSN data, Kaspersky Lab solutions detected and repelled 479,528,279 malicious attacks from online resources located in 190 countries all over the world. 79,209,775 unique URLs were...

View Article

Image may be NSFW.
Clik here to view.

Subtitle Hack Leaves 200 Million Vulnerable to Remote Code Execution

A proof of concept attack using malicious video subtitle files reveals how adversaries can execute remote code on PCs, Smart TVs and mobile devices using popular video players and services such as VLC...

View Article


Image may be NSFW.
Clik here to view.

The Future of Ransomware

Ransomware isn’t new, but it’s increasingly popular and profitable. The concept is simple: Your computer gets infected with a virus that encrypts your files until you pay a ransom. It’s extortion...

View Article

Image may be NSFW.
Clik here to view.

Using Security Intelligence to Detect Insider Threats From Cloud-Based...

Microsoft Office 365 is popular — very popular. In 2016, Gartner reported that 78 percent of enterprises surveyed used or planned to use Office 365. With access to a range of user activity events from...

View Article

Image may be NSFW.
Clik here to view.

Microsoft Quietly Patches Another Critical Malware Protection Engine Flaw

Microsoft quietly patched a critical vulnerability Wednesday in its Malware Protection Engine. The vulnerability was found May 12 by Google’s Project Zero team, which said an attacker could have...

View Article

Image may be NSFW.
Clik here to view.

A week in security (May 22 – May 28)

Last week we informed you about several new threats, including the android ransomware that targets Tencent users. This SLocker.fh masquerades as various legitimate apps to fool users into accepting...

View Article


Image may be NSFW.
Clik here to view.

Chipotle customers told to ‘remain vigilant’ as POS hack probe reveals most...

An investigation into a payment card security incident at Chipotle Mexican Grill has revealed that most of the chain’s 2,000 restaurants were breached and customer information was stolen. An...

View Article


Image may be NSFW.
Clik here to view.

WannaCry mistakes that can help you restore files after infection

Sometimes ransomware developers make mistakes in their code. These mistakes could help victims regain access to their original files after a ransomware infection. This article is a short description...

View Article

Image may be NSFW.
Clik here to view.

Cloak and Dagger: A hole in Android

Everyone, this is not a drill. It applies to all versions of Android, and at the time of this post’s publication, Google has not yet patched the vulnerability. By using this vulnerability, malicious...

View Article

Image may be NSFW.
Clik here to view.

Dark web fraud guides reveal potential threats to orgs

An in-depth look at content from more than 1,000 fraud guides available for sale on the dark web revealed that the majority of these guides are useless. Still, as many as 20 percent have the potential...

View Article


Image may be NSFW.
Clik here to view.

ICS cybersecurity: A view from the field

Over the past few years, even mass media have been writing about industrial control systems (ICS) cybersecurity incidents with increasing frequency. Unfortunately, the problem lies not only in...

View Article

Image may be NSFW.
Clik here to view.

Dvmap: the first Android malware with code injection

In April 2017 we started observing new rooting malware being distributed through the Google Play Store. Unlike other rooting malware, this Trojan not only installs its modules into the system, it also...

View Article

Image may be NSFW.
Clik here to view.

Fireball: Adware with potential nuclear consequences

Advertising can sometimes be annoying — and sometimes it can be malicious. Businesses that make their money selling advertisements sometimes go too far trying to make sure you see their ads. Recently...

View Article

Image may be NSFW.
Clik here to view.

Two Tickets as Bait

Over the previous weekend, social networks were hit with a wave of posts that falsely claimed that major airlines were giving away tickets for free. Users from all over the world became involved in...

View Article



Image may be NSFW.
Clik here to view.

FIN7 Hitting Restaurants with Fileless Malware

FIN7, closely associated with the notorious Carbanak group, is behind a targeted phishing campaign singling out restaurants with fileless malware that is difficult to detect. The recent campaign...

View Article

Image may be NSFW.
Clik here to view.

International operation targets customers of counter anti-virus and crypter...

Between 5 and 9 June, 6 suspects were arrested and 36 were interviewed during an internationally coordinated operation in 6 European countries. The targets are all suspected customers of a counter...

View Article

Image may be NSFW.
Clik here to view.

The NSA has linked the WannaCry computer worm to North Korea

The National Security Agency has linked the North Korean government to the creation of the WannaCry computer worm that affected more than 300,000 people in some 150 countries last month, according to...

View Article

Image may be NSFW.
Clik here to view.

Forget about the malware, go after the attacker’s tactics, techniques and...

The cybercriminal’s options for monetizing attacks has never been broader, less complex, or less risky, and attempts to detect intrusions by detecting the malware they use has never been more...

View Article


Image may be NSFW.
Clik here to view.

From BlackEnergy to ExPetr

Much has been written about the recent ExPetr/NotPetya/Nyetya/Petya outbreak – you can read our findings here:Schroedinger’s Pet(ya) and ExPetr is a wiper, not ransomware. As in the case of Wannacry,...

View Article

Image may be NSFW.
Clik here to view.

Think the ExPetr epidemic doesn’t concern you? Think again

Recent, urgent reports about global cyberattacks revealed that most victims were large businesses. That doesn’t mean ordinary computer users should relax. What causes trouble for big business does...

View Article

Image may be NSFW.
Clik here to view.

Are massive cyberattacks the new normal?

When domain name system services supplier Dyn got hit with a distributed denial of service (DDoS) attack last October, waves of traffic overwhelmed the company’s network and disrupted access to the...

View Article


Image may be NSFW.
Clik here to view.

Symantec to Acquire Mobile Security Firm Skycure

Just three days after announcing that it would acquire Fireglass, Symantec announced that it has agreed to acquire mobile security firm Skycure. Founded in 2012 by two former members of Israel Defense...

View Article


Image may be NSFW.
Clik here to view.

Enterprises face 3,680 potential phishing emails each week

GreatHorn analyzed more than 3.5 terabytes of data – over 373 million corporate emails – to gain insights into the sheer volume of email threats facing enterprises and the role of automated tools in...

View Article

Image may be NSFW.
Clik here to view.

The Magala Trojan Clicker: A Hidden Advertising Threat

The golden age of Trojans and viruses has long gone. Malicious programs created by enthusiasts for research purposes and for fun are now largely confined to history books and dusty computer incident...

View Article

Image may be NSFW.
Clik here to view.

Destruction of Service attacks could shut down organizations for good

The Cisco 2017 Midyear Cybersecurity Report (MCR) uncovers the rapid evolution of threats and the increasing magnitude of attacks, and forecasts potential Destruction of Service attacks, which could...

View Article

Image may be NSFW.
Clik here to view.

A King’s Ransom It is Not

The first half of 2017 began with two intriguing ransomware events, both partly enabled by wormable exploit technology dumped by a group calling themselves “The ShadowBrokers”. These WannaCry and...

View Article


Image may be NSFW.
Clik here to view.

macOS Fruitfly Backdoor Analysis Renders New Spying Capabilities

LAS VEGAS—The FruitFly backdoor became a known entity in January, but it’s a good bet that for years it had been in the wild, undetected by analysts and security software. The macOS and OS X malware...

View Article

Image may be NSFW.
Clik here to view.

CowerSnail, from the creators of SambaCry

We recently reported about SambaCry, a new family of Linux Trojans exploiting a vulnerability in the Samba protocol. A week later, Kaspersky Lab analysts managed to detect a malicious program for...

View Article


Image may be NSFW.
Clik here to view.

Unsecured Wi-Fi hotspots and troubling browsing behaviors

As adoption of cloud and mobile continues to rise, common employee practices inside and outside the workplace create risk for enterprises. To uncover the risks posed by users’ data-related habits,...

View Article

Image may be NSFW.
Clik here to view.

Researchers pull off DNA-based malicious code injection attack

Researchers have demonstrated that it’s possible to create synthetic DNA strands containing malicious computer code that, if sequenced and analyzed, could compromise a computer. The main goal of their...

View Article


Image may be NSFW.
Clik here to view.

Motivation roulette: Is pseudo-ransomware a term?

It used to be so simple. Attack campaigns were relatively simple to determine, for example when we detailed the recent Shamoon campaign it was clear that this was intended to disrupt the victim. In...

View Article

Image may be NSFW.
Clik here to view.

Blizzard Entertainment Hit With Weekend DDoS Attack

Blizzard Entertainment reported a crippling DDoS attack over the weekend creating chronic latency and connection issues for players of games Overwatch, World of Warcraft and others. The DDoS attack...

View Article

Image may be NSFW.
Clik here to view.

IT threat evolution Q2 2017. Statistics

According to KSN data, Kaspersky Lab solutions detected and repelled 342, 566, 061 malicious attacks from online resources located in 191 countries all over the world. 33, 006, 783 unique URLs were...

View Article

Image may be NSFW.
Clik here to view.

How to spot malicious mobile apps

The pervasiveness of smartphones has resulted in an onslaught of mobile apps, and it’s pretty safe to say that, by now, there is an app for every imaginable purpose. Unfortunately, among the many...

View Article


Image may be NSFW.
Clik here to view.

A new website explains data breach risk

Data breaches are so common that even a theft of a billion records of seriously confidential information barely makes the news. It’s business as usual. Part of the problem is that all the data...

View Article

Browsing latest articles
Browse All 126 View Live




Latest Images