How to explore the Internet safely on your iPad and iPhone
It’s true not much malware exists in the wild for MacOS or iOS. But there is some — and phishing sites, spammers, and carders don’t discriminate on the basis of operating system. To protect you from...
View ArticleWhite House extends state of emergency for cyber threats
President Trump will continue a 2015 state of national emergency that President Obama used as a basis for freezing the assets of Russians tied to a hacking campaign aimed at disrupting the...
View ArticleMillions of websites affected by unpatched flaw in Microsoft IIS 6 web server
A proof-of-concept exploit has been published for an unpatched vulnerability in Microsoft Internet Information Services 6.0, a version of the web server that’s no longer supported but still widely...
View ArticleLatest WikiLeaks dump exposes CIA methods to mask malware
WikiLeaks may have dealt another blow to the CIA’s hacking operations by releasing files that allegedly show how the agency was masking its malware attacks. On Friday, the site dumped the source code...
View ArticleThree ways to rob an ATM: Remote, almost remote, and physical
You might’ve noticed that we are fond of theft by ATM. No, we don’t hack them ourselves, but whenever someone else does, we jump right on the case. At SAS 2017, the main cybersecurity event of the...
View ArticleClever Physical ATM Attack
This is an interesting combination of computer and physical attack: Researchers from the Russian security firm Kaspersky on Monday detailed a new ATM-emptying attack, one that mixes digital savvy with...
View ArticleF-Secure buys Little Flocker to combat macOS ransomware
With attacks against Mac users growing in number and sophistication, endpoint security vendor F-Secure has decided to acquire Little Flocker, a macOS application that provides behavior-based...
View ArticleSamsung’s squashing of malicious Tizen smart TV bugs is turning messy
After 40 critical vulnerabilities on Samsung’s Tizen — used in smart TVs and smartwatches — were exposed this week by Israeli researcher Amihai Neiderman, the company is scrambling to patch them. But...
View ArticleA vigilante hacker may have built a computer worm to protect the IoT
Is a vigilante hacker trying to secure your IoT device from malware? The mysterious developer behind a growing computer worm wants people to think so. The worm, known as Hajime, has infected tens of...
View ArticleHackers use old Stuxnet-related bug to carry out attacks
Users that run unpatched software beware. Hackers have been relying on an old software bug tied to the Stuxnet worm to carry out their attacks. Microsoft may have initially patched the flaw in 2010,...
View ArticleNo Fix for SquirrelMail Remote Code Execution Vulnerability
The PHP-based webmail package SquirrelMail suffers from a remote code execution vulnerability that could let attackers execute arbitrary commands on the target and compromise the system. Dawid...
View ArticleRansomware attacks are taking a greater toll on victim’s wallets
The hackers spreading ransomware are getting greedier. In 2016, the average ransom demand to free computers hit with the infection rose to US$1,077, up from $294 the year before, according to security...
View ArticleRansomware, Cyberespionage Dominate Verizon DBIR
Ransomware dominated malware-related data breaches investigated by Verizon last year, appearing in 71 percent of cases, according to the annual Verizon Data Breach Investigations Report (DBIR)...
View ArticleWill fileless malware push the antivirus industry into oblivion?
The death of antivirus has been prophesied for years now, but the AV industry is still alive and kicking. SentinelOne, though, believes that in-memory resident attacks, i.e. fileless malware, just...
View ArticleVanilla Forums Open Source Software Vulnerable to RCE, Host Header Injection...
Popular open source forum software suffers from vulnerabilities that could let an attacker gain access to user accounts, carry out web-cache poisoning attacks, and in some instances, execute arbitrary...
View ArticleIT threat evolution Q1 2017. Statistics
According to KSN data, Kaspersky Lab solutions detected and repelled 479,528,279 malicious attacks from online resources located in 190 countries all over the world. 79,209,775 unique URLs were...
View ArticleSubtitle Hack Leaves 200 Million Vulnerable to Remote Code Execution
A proof of concept attack using malicious video subtitle files reveals how adversaries can execute remote code on PCs, Smart TVs and mobile devices using popular video players and services such as VLC...
View ArticleThe Future of Ransomware
Ransomware isn’t new, but it’s increasingly popular and profitable. The concept is simple: Your computer gets infected with a virus that encrypts your files until you pay a ransom. It’s extortion...
View ArticleUsing Security Intelligence to Detect Insider Threats From Cloud-Based...
Microsoft Office 365 is popular — very popular. In 2016, Gartner reported that 78 percent of enterprises surveyed used or planned to use Office 365. With access to a range of user activity events from...
View ArticleMicrosoft Quietly Patches Another Critical Malware Protection Engine Flaw
Microsoft quietly patched a critical vulnerability Wednesday in its Malware Protection Engine. The vulnerability was found May 12 by Google’s Project Zero team, which said an attacker could have...
View ArticleA week in security (May 22 – May 28)
Last week we informed you about several new threats, including the android ransomware that targets Tencent users. This SLocker.fh masquerades as various legitimate apps to fool users into accepting...
View ArticleChipotle customers told to ‘remain vigilant’ as POS hack probe reveals most...
An investigation into a payment card security incident at Chipotle Mexican Grill has revealed that most of the chain’s 2,000 restaurants were breached and customer information was stolen. An...
View ArticleWannaCry mistakes that can help you restore files after infection
Sometimes ransomware developers make mistakes in their code. These mistakes could help victims regain access to their original files after a ransomware infection. This article is a short description...
View ArticleCloak and Dagger: A hole in Android
Everyone, this is not a drill. It applies to all versions of Android, and at the time of this post’s publication, Google has not yet patched the vulnerability. By using this vulnerability, malicious...
View ArticleDark web fraud guides reveal potential threats to orgs
An in-depth look at content from more than 1,000 fraud guides available for sale on the dark web revealed that the majority of these guides are useless. Still, as many as 20 percent have the potential...
View ArticleICS cybersecurity: A view from the field
Over the past few years, even mass media have been writing about industrial control systems (ICS) cybersecurity incidents with increasing frequency. Unfortunately, the problem lies not only in...
View ArticleDvmap: the first Android malware with code injection
In April 2017 we started observing new rooting malware being distributed through the Google Play Store. Unlike other rooting malware, this Trojan not only installs its modules into the system, it also...
View ArticleFireball: Adware with potential nuclear consequences
Advertising can sometimes be annoying — and sometimes it can be malicious. Businesses that make their money selling advertisements sometimes go too far trying to make sure you see their ads. Recently...
View ArticleTwo Tickets as Bait
Over the previous weekend, social networks were hit with a wave of posts that falsely claimed that major airlines were giving away tickets for free. Users from all over the world became involved in...
View ArticleFIN7 Hitting Restaurants with Fileless Malware
FIN7, closely associated with the notorious Carbanak group, is behind a targeted phishing campaign singling out restaurants with fileless malware that is difficult to detect. The recent campaign...
View ArticleInternational operation targets customers of counter anti-virus and crypter...
Between 5 and 9 June, 6 suspects were arrested and 36 were interviewed during an internationally coordinated operation in 6 European countries. The targets are all suspected customers of a counter...
View ArticleThe NSA has linked the WannaCry computer worm to North Korea
The National Security Agency has linked the North Korean government to the creation of the WannaCry computer worm that affected more than 300,000 people in some 150 countries last month, according to...
View ArticleForget about the malware, go after the attacker’s tactics, techniques and...
The cybercriminal’s options for monetizing attacks has never been broader, less complex, or less risky, and attempts to detect intrusions by detecting the malware they use has never been more...
View ArticleFrom BlackEnergy to ExPetr
Much has been written about the recent ExPetr/NotPetya/Nyetya/Petya outbreak – you can read our findings here:Schroedinger’s Pet(ya) and ExPetr is a wiper, not ransomware. As in the case of Wannacry,...
View ArticleThink the ExPetr epidemic doesn’t concern you? Think again
Recent, urgent reports about global cyberattacks revealed that most victims were large businesses. That doesn’t mean ordinary computer users should relax. What causes trouble for big business does...
View ArticleAre massive cyberattacks the new normal?
When domain name system services supplier Dyn got hit with a distributed denial of service (DDoS) attack last October, waves of traffic overwhelmed the company’s network and disrupted access to the...
View ArticleSymantec to Acquire Mobile Security Firm Skycure
Just three days after announcing that it would acquire Fireglass, Symantec announced that it has agreed to acquire mobile security firm Skycure. Founded in 2012 by two former members of Israel Defense...
View ArticleEnterprises face 3,680 potential phishing emails each week
GreatHorn analyzed more than 3.5 terabytes of data – over 373 million corporate emails – to gain insights into the sheer volume of email threats facing enterprises and the role of automated tools in...
View ArticleThe Magala Trojan Clicker: A Hidden Advertising Threat
The golden age of Trojans and viruses has long gone. Malicious programs created by enthusiasts for research purposes and for fun are now largely confined to history books and dusty computer incident...
View ArticleDestruction of Service attacks could shut down organizations for good
The Cisco 2017 Midyear Cybersecurity Report (MCR) uncovers the rapid evolution of threats and the increasing magnitude of attacks, and forecasts potential Destruction of Service attacks, which could...
View ArticleA King’s Ransom It is Not
The first half of 2017 began with two intriguing ransomware events, both partly enabled by wormable exploit technology dumped by a group calling themselves “The ShadowBrokers”. These WannaCry and...
View ArticlemacOS Fruitfly Backdoor Analysis Renders New Spying Capabilities
LAS VEGAS—The FruitFly backdoor became a known entity in January, but it’s a good bet that for years it had been in the wild, undetected by analysts and security software. The macOS and OS X malware...
View ArticleCowerSnail, from the creators of SambaCry
We recently reported about SambaCry, a new family of Linux Trojans exploiting a vulnerability in the Samba protocol. A week later, Kaspersky Lab analysts managed to detect a malicious program for...
View ArticleUnsecured Wi-Fi hotspots and troubling browsing behaviors
As adoption of cloud and mobile continues to rise, common employee practices inside and outside the workplace create risk for enterprises. To uncover the risks posed by users’ data-related habits,...
View ArticleResearchers pull off DNA-based malicious code injection attack
Researchers have demonstrated that it’s possible to create synthetic DNA strands containing malicious computer code that, if sequenced and analyzed, could compromise a computer. The main goal of their...
View ArticleMotivation roulette: Is pseudo-ransomware a term?
It used to be so simple. Attack campaigns were relatively simple to determine, for example when we detailed the recent Shamoon campaign it was clear that this was intended to disrupt the victim. In...
View ArticleBlizzard Entertainment Hit With Weekend DDoS Attack
Blizzard Entertainment reported a crippling DDoS attack over the weekend creating chronic latency and connection issues for players of games Overwatch, World of Warcraft and others. The DDoS attack...
View ArticleIT threat evolution Q2 2017. Statistics
According to KSN data, Kaspersky Lab solutions detected and repelled 342, 566, 061 malicious attacks from online resources located in 191 countries all over the world. 33, 006, 783 unique URLs were...
View ArticleHow to spot malicious mobile apps
The pervasiveness of smartphones has resulted in an onslaught of mobile apps, and it’s pretty safe to say that, by now, there is an app for every imaginable purpose. Unfortunately, among the many...
View ArticleA new website explains data breach risk
Data breaches are so common that even a theft of a billion records of seriously confidential information barely makes the news. It’s business as usual. Part of the problem is that all the data...
View Article
More Pages to Explore .....