Items Tagged with "malware"
February 26, 2011 Added by:Bill Gerneglia
These figures were reported by Eurostat, the European Union's office of statistics. They recently stated that 31% of all Internet users in the 27 EU member nations had contracted a computer virus that resulted in "loss of information or time" in the second quarter of 2010...
February 25, 2011 Added by:Headlines
One of the biggest problems Khan notes is the inability of targeted entities to produce accurate information pertaining to attack attribution, citing a report by the ITRC which stated that out of the 662 registered breaches, forty percent of targets could not identify the origin of the attacks...
February 24, 2011 Added by:Mike Meikle
The ThreatPost report outlines concerns over the complexity of smartphones, lack of basic email encryption regimens, and the unknown impact of third-party applications on the hardware lead to a changing and more threatening security landscape for 2011...
February 24, 2011 Added by:Headlines
The plain fact is that most organizations are falling far short in protecting against the same threats that they've faced for the last 10 years. SQL injection, phishing, malicious attachments, social engineering. Old, every one of them. And yet, still incredibly effective at compromising networks in some of the best-known and theoretically best-protected companies.
February 23, 2011 Added by:Headlines
"Another interesting feature of OddJob, which makes it stand out from the malware crowd, is its ability to bypass the logout request of a user to terminate their online session... the legitimate user thinks they have logged out, when in fact the fraudsters remain connected..."
February 22, 2011 Added by:Don Eijndhoven
Endpoint protection will remain the name of the game, and what software vendors are doing right now isn't working. Its a failing approach that’s becoming increasingly obvious with each new report of a major breach. A change needs to be made before Organized Crime realizes its full potential...
February 21, 2011 Added by:J. Oquendo
Magenta would be a new breed of windows based rootkit. The Magenta rootkit body is injected into kernel memory via the DriverEntry() partial-load technique. Once loaded into kernel memory, Magenta would automatically identify an active process/thread context to inject itself via an APC...
February 21, 2011 Added by:Headlines
The ongoing assumption has been that applications offered in the app marketplace have been vetted for security, but McAfee researchers have evidence that some mobile applications that have been approved for distribution may not be as secure as consumers would expect...
February 21, 2011 Added by:Mark Baldwin
February 19, 2011 Added by:Dan Dieterle
Apparently the hi-tech virus or information about it was obtained by the group after they hacked security company HBGary Federal. The security company had been tracking down leaders of Anonymous and was preparing to release the names at an upcoming security conference...
February 19, 2011 Added by:Headlines
Attackers used targeted spear-phishing methods to gain access to executive's computers,then produced fraudulent emails that were sent out to numerous department staff. The emails contained attachments infected with malware that would harvest data and transmit the information to the attackers...
February 17, 2011 Added by:Ben Keeley
Norton (Symantec) released a new cybercrime tool, it's pitched as a tool that 'measures and warns people about cybercrime risks around the world'. At first glance the Internet version is a very slick and smooth interface, which displays recent trends for ID theft, malware, spam and fraud...
February 16, 2011 Added by:Anton Chuvakin
My past experience predicting shows that I am a cowardly, extrapolating predictor – and can get a lot of easy, obvious stuff right. I will do some of it now as well since there is nothing wrong with “Feynman prediction methodology”: predicting that whatever is there now will stay the same in the future...
February 15, 2011 Added by:Brent Huston
The key point of this topic though, is that pirated software remains a significant threat to businesses without proper license controls. Particularly small and mid-size businesses where piracy often runs rampant, this presents a very wide target for attackers...
February 11, 2011 Added by:Headlines
Mobile attacks are proving easier for criminals to employ with greater success rates as opposed to PC based attacks, and with the dramatic increase in the volume of mobile transactions, cyber criminals are quickly adapting by shifting their focus...
February 10, 2011 Added by:Lenny Zeltser
Tracking metrics related to security controls gives CISOs and business executives the ability to steer the security program in the right direction. Without metrics, the security program exists as an art project, rather than an engineering or business discipline...