Blog Posts Tagged with "Trojans"

Ba829a6cb97f554ffb0272cd3d6c18a7

Seven Security Blankets and I'm Still Short-Sheeted

July 17, 2011 Added by:Kevin McAleavey

Client-side "layered security" is a mess. It fails because people are so irritated by all the alerts that they don't understand. They no longer trust their security arrangements, and when they visit a site that offers a rogue antivirus and no alert pops up, they let it run for a second opinion...

Comments  (0)

Ba829a6cb97f554ffb0272cd3d6c18a7

The Best And Most Secure Windows OS Ever

July 14, 2011 Added by:Kevin McAleavey

When it comes to the number one "moment of abject stupidity" that award has to go to "browser/OS integration" with the release of Windows98. There was much outcry including my own testimony at an FTC hearing, and at the end of my testimony, I warned the FTC what was to come from this...

Comments  (5)

Ba829a6cb97f554ffb0272cd3d6c18a7

The Demise of the Antivirus Industry

July 12, 2011 Added by:Kevin McAleavey

Over the past 30 years, the antivirus industry was used to doing things only one way. And the creative people who came up with unique and sometimes eccentric ways of thinking outside anyone's box all got shunted aside in favor of people who did things "by the book."...

Comments  (5)

69dafe8b58066478aea48f3d0f384820

Federal Reserve Spam Message Carries Zeus Payload

June 30, 2011 Added by:Headlines

"The attack appears [to] focus on users of online banking services, especially small businesses and corporations. The messages are not well done. They are badly written and don’t really attempt to hide the fact that the attached file has the double extension .pdf.exe..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Authorities Bust $72 Million Dollar Conficker Fraud Ring

June 27, 2011 Added by:Headlines

"The Security Service of Ukraine, in coordination with the law enforcement agencies of United States, Great Britain, Netherlands, France, Germany, Latvia, Cyprus and other countries (10 in total), defeated illegal activity of the international criminal group of hackers..."

Comments  (0)

Ba829a6cb97f554ffb0272cd3d6c18a7

Warning: Original "50 Days of Lulz" Payload is Infected

June 27, 2011 Added by:Kevin McAleavey

Even after the lulz have officially ended, the adventure continues for the hapless crew of the LulzBoat. After piping off the ship and dropping their cargo on "The Pirate Bay" it turns out that the RAR file offered as a torrent download is infected with a backdoor of the "RBOT" class of malware...

Comments  (12)

4ff49873e3fed9a24adf0d37ae00b780

Questions Likely to be Asked on a Security Certification

June 10, 2011 Added by:Lee Munson

Most of these questions will seem like common sense but make sure that you look at your booklet before the test and give the answer they want. A lot of us may have different ways of dealing with clients but if you want to past your test, give the answer that they want you to give...

Comments  (0)

0dc5fdbc98f80f9aaf2b43b8bc795ea8

Five Reasons Why Your Workplace Blocks Facebook

June 07, 2011 Added by:Global Knowledge

Don’t you just love Facebook? Whether it’s adding new members to Mafia Wars, finding new busboys for Café World, or cyberstalking your ex-girlfriend’s new boyfriend, Facebook has endless options to keep you entertained. If only you could logon at work, then your life would be complete...

Comments  (0)

43559f6a0465c923b496a260211995c0

SecurID: No Need for the Seed!

May 30, 2011 Added by:Pascal Longpre

An attacker who has installed the target's VPN client and configuration patiently waits for the user to authenticate. When the user begins to enter its 6 digit SecurID password, the Trojan captures the characters entered and immediately sends them through SSL to the attacker's machine...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

SMS Trojan Infects Multiple Android Applications

May 16, 2011 Added by:Headlines

"Google has removed the offending apps, published by "zsone," from the official Android Market, but researchers at the security firm Kaspersky Lab said it's possible the malware, classified as a Trojan because it hides inside software, affects more than the 11 apps AegisLab found..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Sunspot Financial Malware Targeting Windows Systems

May 13, 2011 Added by:Headlines

"Sunspot was not originally developed as crimeware... We could be witnessing a sea change in malware development where general purpose and little know malware platforms are re-programmed to carry out financial fraud. This will make it even more difficult to defend against..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Fake Windows Security Updates Spread Zeus Trojan

May 13, 2011 Added by:Headlines

In the run-up to Microsoft's Patch Tuesday, Windows users are being warned of an email spam campaign designed to infect PC's with the Zeus Trojan. Researchers indicate the malware spam operation began on Friday, May 6, and is still actively delivering the fake update alerts...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Source Code for Zeus Crimeware Toolkit Disclosed

May 11, 2011 Added by:Headlines

"With the source code in the wild it's likely we'll see an increase in attacks since lots of potential criminals might have been lacking both financials and trustworthiness to obtain their own license of this kit. Now being available as source code we'll likely see rebranding and modifications..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Android Malware Increased 400% Over Six Months

May 11, 2011 Added by:Headlines

"App store processes of reactively removing applications identified as malicious after they have been installed by thousands of users is insufficient as a means to control malware proliferation. There are specifics steps users must take to mitigate mobile attacks..."

Comments  (0)

37d5f81e2277051bc17116221040d51c

McAfee’s Most Unwanted Identity Theft Criminals

May 05, 2011 Added by:Robert Siciliano

McAfee has created a tongue-in-cheek list of the most unwanted identity thieves, describing the various techniques thieves use to steal your information. It’s clever and, unfortunately, very real...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Internet Overrun with Osama Bin Laden Malware Traps

May 02, 2011 Added by:Headlines

When the user clicks on the link, they will download a file titled XvidSetup.exe. This is actually a popular adware tool known as hotbar. At present, 19 of 41 antivirus engines are blocking the file. Sadly, there will be no shortage of scams taking advantage of this historic news...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »