Blog Posts Tagged with "malware"
April 04, 2011 Added by:Scot Terban
People in the know are worried that Stuxnet was released into systems that were not completely understood. Iran, being as hard to get intel on, may have had configurations that the creators of Stuxnet did not account for, and it could indeed have caused a larger catastrophe...
April 04, 2011 Added by:Headlines
The mass-injection attack, which experts say is the largest of its kind ever seen, has managed to insert malicious code into websites by gaining access to the servers running the databases behind the Internet, according to the technology security company that discovered it...
April 01, 2011 Added by:Headlines
"Users continue to fall victim to malicious links offering to take them to an exciting video or the new episode of their favorite TV show. This technique has become a weapon of choice for hackers as it requires minimum investment and attracts a large number of victims..."
April 01, 2011 Added by:Headlines
"The next generation of cyber threats may directly affect aviation equipment, not simply stealing credit cards and denying travelers access to online booking sites. For the future, cyber-threats will be more diversified and take the form of multi-stage and multi-dimensional attacks..."
March 30, 2011 Added by:Headlines
Facebook users were lured to the infected websites with specially designed spam messages, and the messages posted to their profile walls that contained links to infected sites, which caused the worm to spread rapidly across the network...
March 29, 2011 Added by:Headlines
Boodaei calls the attack "VIGNS" - short for "Vanity Infection from Google News Searches" - and the purpose is to create the circumstance where the targeted victim will enable the attacker to circumvent security measures and infect the executive's computer with malware...
March 25, 2011 Added by:Headlines
Harnig was a key component of the Rustock botnet distribution network for about the last two years, and may have been scuttled in order to prevent investigators from tracking down its creators after federal officials raided internet hosting companies who provided services for the Rustock botnet...
March 24, 2011 Added by:Pascal Longpre
Documents leaked in the attack on HBGary shed light on numerous rootkit technologies designed to evade or bypass mainstream detection software and circumvent protections thought to be unbreakable by design. Malware like this also renders disk encryption, DLP and SIEM solutions mostly irrelevant...
March 23, 2011 Added by:Headlines
Forty-five percent of K-12 schools suffered network downtime from malware outbreaks between two and five times per year, while another thirteen percent are impacted between six and ten times per year, and six percent experience more than ten incidents in the same period...
March 20, 2011 Added by:Anthony M. Freed
Generators and water pumps are examples of rotating machinery that are controlled in industrial systems by PLCs. It is not hard to extrapolate that designer-malware like Stuxnet could target these systems and cause the shut down of a nuclear power plant or the release of a radioactive plume...
March 19, 2011 Added by:Simon Heron
This increased activity is probably caused by botnet herders attempting to increase the size of their botnets, and this will probably be followed by a corresponding increase in spam levels. It might be that the recent decline in Spam may be reversed...
March 17, 2011 Added by:Headlines
A successful exploit could allow the attacker to use the BlackBerry Browser to access user data stored on the media card and in the built-in media storage on the BlackBerry smartphone, but not to access user data that the email, calendar and contact applications store in the application storage...
March 16, 2011 Added by:Simon Heron
The malware is able to wait until the victim has successfully logged on to their bank before inserting itself between the browser and the bank’s website and then invisibly transferring money to some individual who believes they are working for a legitimate company...
March 16, 2011 Added by:Lindsay Walker
Managing and monitoring corporate security requires a strong commitment from everyone in an organization. Systems need to be updated regularly, IT personnel need to stay up to date on new security trends and employees require ongoing training to ensure they are doing their part to help out...
March 15, 2011 Added by:Richard Stiennon
The tools and methods include the use of custom Trojans, back hacking, infiltration, exfiltration, recruitment, IP signal intelligence, seeding, and poisoning. But getting actionable intelligence into the right hands is the hardest task. This post proposes one such operational structure...
Wanna Buy Some Dumps?... Biniohs Chekcer on 06-19-2013
Student Pleads Guilty to Counterfeiting Coup... on 06-18-2013