Blog Posts Tagged with "malware"

69dafe8b58066478aea48f3d0f384820

Email Malware Increases 400% Since Rustock Takedown

April 13, 2011 Added by:Headlines

The first quarter of 2011 was also witness to a broad range of attempts to distribute malware, and increased malware levels overall. These attempts included malware sent through Facebook chat, or which used other wellknown brand-names such as T-Online and Xerox...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Adobe Confirms Another Flash Player Zero Day Bug

April 12, 2011 Added by:Headlines

This vulnerability could allow an attacker to take control of the affected system. There are reports that this vulnerability is being exploited in the wild in targeted attacks via a Flash file embedded in a Microsoft Word file delivered as an email attachment...

Comments  (0)

B451da363bb08b9a81ceadbadb5133ef

What the Epsilon Data Breach Means To You

April 11, 2011 Added by:Alexander Rothacker

Organizations rely on third party providers for numerous responsibilities and often treat them as an extension of their organization. Allowing third party access to ANY information should REQUIRE that they provide the most stringent security measures...

Comments  (0)

37d5f81e2277051bc17116221040d51c

mCrime Takes A Leap Into Profitability For Criminals

April 11, 2011 Added by:Robert Siciliano

As smartphones continue replacing landlines and billions of new applications are downloaded, mobile crime, or mCrime, will inevitably increase. McAfee’s threat report for the fourth quarter of 2010 reveals steady growth of threats to mobile platforms...

Comments  (0)

850c7a8a30fa40cf01a9db756b49155a

Advanced Persistent Threats - Blame It On REO

April 10, 2011 Added by:J. Oquendo

We can never stop an attacker from trying to compromise us, it is out of our control. This does not mean that we cannot stop connections from leaving that machine. After all, controlling what leaves a machine will always be more important than what is coming INTO a machine...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Facebook Continually Plagued with Malware and Scams

April 05, 2011 Added by:Headlines

"An estimated 600,000 people have clicked onto the link, which falsely promises to show them a funny Photoshopped image of themselves. In reality users install a rogue application which sends messages to their contacts via the social network's IM feature, continuing the infection cycle..."

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Does Multi-Factor Authentication Even Matter Anymore?

April 05, 2011 Added by:Rafal Los

Multi-factor authentication systems that use one-time passwords give the attacker a very small window within which to strike. They have that one session, and then they have to orchestrate the attack again, whereas with a password compromise you can keep attacking over and over...

Comments  (10)

69dafe8b58066478aea48f3d0f384820

Symantec Report Details the Evolving Threat Landscape

April 05, 2011 Added by:Headlines

"Stuxnet and Hydraq... represented true incidents of cyberwarfare and have fundamentally changed the threat landscape. The nature of the threats has expanded from targeting individual bank accounts to targeting the information and physical infrastructure of nation states..."

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Stuxnet’s Potential for A Chernobyl-Style Incident at Bushehr

April 04, 2011 Added by:Infosec Island Admin

People in the know are worried that Stuxnet was released into systems that were not completely understood. Iran, being as hard to get intel on, may have had configurations that the creators of Stuxnet did not account for, and it could indeed have caused a larger catastrophe...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

LizaMoon Malware Attack Continues to Spread Rapidly

April 04, 2011 Added by:Headlines

The mass-injection attack, which experts say is the largest of its kind ever seen, has managed to insert malicious code into websites by gaining access to the servers running the databases behind the Internet, according to the technology security company that discovered it...

Comments  (0)

C6eac1ead1a5946e78fb19701ff40acd

Dr. InfoSec's Quotes of the Week (016)

April 01, 2011 Added by:Christophe Veltsos

Who said: "We've approached security layer by layer. I have one tool for Web access, another tool for network access, another tool for e-mail. And yet I can't answer the basic question: Am I secure?"...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Videos and Multimedia are Most Popular Malware Traps

April 01, 2011 Added by:Headlines

"Users continue to fall victim to malicious links offering to take them to an exciting video or the new episode of their favorite TV show. This technique has become a weapon of choice for hackers as it requires minimum investment and attracts a large number of victims..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Hackers Are Second Biggest Threat to Airline Security

April 01, 2011 Added by:Headlines

"The next generation of cyber threats may directly affect aviation equipment, not simply stealing credit cards and denying travelers access to online booking sites. For the future, cyber-threats will be more diversified and take the form of multi-stage and multi-dimensional attacks..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Facebook Users Targeted by Cross-Site Scripting Exploit

March 30, 2011 Added by:Headlines

Facebook users were lured to the infected websites with specially designed spam messages, and the messages posted to their profile walls that contained links to infected sites, which caused the worm to spread rapidly across the network...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Attack Utilizes Vanity Searches to Target Executives

March 29, 2011 Added by:Headlines

Boodaei calls the attack "VIGNS" - short for "Vanity Infection from Google News Searches" - and the purpose is to create the circumstance where the targeted victim will enable the attacker to circumvent security measures and infect the executive's computer with malware...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Harnig Botnet Scuttled after Rustock Botnet Takedown

March 25, 2011 Added by:Headlines

Harnig was a key component of the Rustock botnet distribution network for about the last two years, and may have been scuttled in order to prevent investigators from tracking down its creators after federal officials raided internet hosting companies who provided services for the Rustock botnet...

Comments  (0)

Page « < 27 - 28 - 29 - 30 - 31 > »