Blog Posts Tagged with "malware"

7af56c65866a442699d6dd1dfb02b528

NSTIC – The Right Step, But is the Direction Right?

May 02, 2011 Added by:Eli Talmor

"All the authentication in the world won't stop a bad guy who goes around the authentication system, either by finding bugs exploitable before authentication is performed, finding bugs in the authentication system itself, or hijacking your system and abusing the authenticated connection..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Internet Overrun with Osama Bin Laden Malware Traps

May 02, 2011 Added by:Headlines

When the user clicks on the link, they will download a file titled XvidSetup.exe. This is actually a popular adware tool known as hotbar. At present, 19 of 41 antivirus engines are blocking the file. Sadly, there will be no shortage of scams taking advantage of this historic news...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Should You Worry About Smartphone Security?

May 02, 2011 Added by:Robert Siciliano

“Mobile systems lag far behind the established industry standard for open disclosure about problems and regular patch distribution. For example, Google has never made an announcement to its android-security-announce mailing list, although of course they have released many patches.."

Comments  (0)

0dc5fdbc98f80f9aaf2b43b8bc795ea8

Did You Get the FakeRean Windows Virus?

May 01, 2011 Added by:Global Knowledge

The rogue security software will be accompanied by deceptive sales tactics and false positives to lure you into purchasing a software license or security subscription. This is known as scareware. Don’t take the bait unless you are in the mood for additional malware...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Experts: Is Iran Crying Wolf over Stars Malware Attack?

April 28, 2011 Added by:Headlines

"Given the lack of opaqueness on the part of Iran, it seems unlikely that there has been anything new discovered and it is questionable as to whether or not anything at all was found, and if something was, whether or not it was truly malicious..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Feds to Remove Coreflood Botnet from PCs Remotely

April 28, 2011 Added by:Headlines

In an unprecedented move, the Department of Justice has sought a preliminary injunction in U.S. District Court that will allow the agency to issue instructions to systems infected by the Coreflood botnet that will cause the malware to delete itself...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Symantec Releases MessageLabs April Intelligence Report

April 26, 2011 Added by:Headlines

As the financial year draws to a close in many countries, it is possible that the timing is perfect for cybercriminals seeking information about the financial performance of a company, and a carefully crafted attack may be the means by which they can achieve this...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Human Immune Response Model for Advanced Security Systems

April 25, 2011 Added by:Headlines

"We want the machines to take a more active part in their own protection. We want to use their brains to protect themselves, but always in the context of the policies of the system administrators and owners," said senior counselor for cyber security at the DHS Bruce McConnell...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Iran Targeted by New Computer Worm in Cyber Attack

April 25, 2011 Added by:Headlines

"Certain characteristics about the 'Stars' virus have been identified, including that it is compatible with the (targeted) system. In the initial stage, the damage is low and it is likely to be mistaken for governmental executable files..."

Comments  (1)

B64e021126c832bb29ec9fa988155eaf

Chinese Hackers Spear-Phishing for US Military Secrets

April 23, 2011 Added by:Dan Dieterle

What could the Chinese hope to gain? Military secrets. Along with terabytes of data that have been stolen, the Chinese also obtained login credentials and blue prints to some of America’s hi-tech military equipment...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

A Brief History of Smartphone Insecurity

April 20, 2011 Added by:Headlines

Statistics show that the targeting of mobile devices by criminal hackers continues to grow more intense. Brad Reed has an excellent article that traces the brief history of smartphone insecurity, listing the top smartphone vulnerability exploits of the last five years...

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

Learning USB Lessons the Hard Way

April 20, 2011 Added by:Brent Huston

Our inspection revealed a job in the scheduler set to kick off on Saturdays at 5am and launch this particular malware component which appeared to be designed to grab the cookies from the browser and some credentials from the system and users then throw them out to the host in China...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Cyber Attack Hits Oak Ridge National Laboratory

April 19, 2011 Added by:Headlines

"Certainly what we’ve seen is very consistent with the RSA attack. Whoever is doing this attempts to get a foothold in the network system, works patiently and relatively quietly to try to expand that and is looking for specific types of information..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Adobe Issues Updates for Flash Zero Day Vulnerability

April 18, 2011 Added by:Headlines

Adobe has issued an update to counter the latest Flash player zero-day flaw which is similar to a vulnerability patched last month that was suspected of playing a critical role in the network breach of security vendor RSA, a division of EMC...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Iran May Sue Siemens over Stuxnet Virus

April 18, 2011 Added by:Headlines

"Iran's Foreign Ministry should probe into the political and legal aspects of the cyber attack while other Iranian bodies should pursue and complain to international circles... Siemens should explain why and how it provided the enemies with the codes for the SCADA software..."

Comments  (0)

314f19f082e69886c20e31c70fe6dceb

Epsilon: Be Wary of Phishing Attempts

April 18, 2011 Added by:Rod MacPherson

Another scam that they are running is a fake Epsilon breach news update site (copied from the actual press release site) that offers up a downloadable tool that they tell you to run to see if the hackers have your e-mail address. That tool is a Trojan...

Comments  (0)

Page « < 27 - 28 - 29 - 30 - 31 > »