Blog Posts Tagged with "Trojans"
As BYOD Trend Grows So Do Malware Attacks
September 06, 2012 Added by:Bill Gerneglia
The report found that the majority of employee’s devices did not have any form of security software loaded nor were company materials protected. The new report provides detailed assessments of the mobile security threat and the growing market for security solutions...
Comments (0)
Mahdi Trojan Employed in Middle Eastern Cyber Espionage
July 18, 2012 Added by:Headlines
"It is still unclear whether this is a state-sponsored attack or not. The targeted organizations seem to be spread between members of the attacking group by giving each victim machine a specific prefix name, meaning that this operation might require a large investment and financial backing..."
Comments (0)
AttacksTargeting Activists Uses Blackshades Trojan
July 16, 2012 Added by:Electronic Frontier Foundation
A new campaign using Blackshades Remote Controller has been discovered via a message sent from a compromised Skype account. This malware gives an attacker the ability to execute arbitrary code on the infected computer. There is no guarantee that the attacker has not installed additional malicious software...
Comments (0)
ENISA: High Roller Online Bank Robberies Reveal Security Gaps
July 05, 2012 Added by:Headlines
The old adage that “criminals go where the money is” means that bank robbers go online, Executive Director of ENISA, Professor Udo Helmbrecht states. It should come as no surprise that large organized crime groups are targeting online banking sites. Still, the attacks drew much attention for three reasons...
Comments (0)
Cloud Coverage: Malware as a Service
July 04, 2012 Added by:Gregory Hale
The cloud-based control panel uses the secure HTTPS protocol and has a valid certificate. The customer has access to tutorials and a malware engine that generates customized Trojans in real-time. The team behind the service makes sure the created Trojans have a low rate of detection by major antivirus products...
Comments (0)
Talking to Your Management Rationally About Malware
June 28, 2012 Added by:Brent Huston
Malware with comparisons to Stuxnet are all the rage these days. Much of what is in the media is either hysteria, hype, confusion or outright wrong. As an infosec practitioner, your job is to explain to folks in a rational way about the trends and topics in the news carefully, truthfully, and rationally...
Comments (0)
Ever More Sophisticated Malware Targets Online Banking
June 21, 2012 Added by:Plagiarist Paganini
Automatic Transfer Systems (ATSs) have been introduced in some variants of the infamous SpyEye and ZeuS Trojans, the nightmares of the banking world. The ATSs are parts of WebInject files known to be a collection of scripts implemented to steal online banking, email, and financial account credentials...
Comments (0)
Malware Targeting Android Devices Increases Sharply
May 17, 2012 Added by:Headlines
"The number of malicious Android application package files (APKs) received in Q1 2011 and in Q1 2012 reveals... an increase from 139 to 3063 counts... attributed to malware authors crafting their infected or trojanized applications to defeat anti-virus signature detection..."
Comments (0)
Zeus Malware Targeting Facebook, Gmail and Yahoo Users
May 16, 2012 Added by:Headlines
"We've recently discovered a series of attacks being carried out by a P2P variant of the Zeus platform against some of the internet’s leading online services... The attacks are targeting users of Facebook, Google Mail, Hotmail and Yahoo – offering rebates and new security measures..."
Comments (0)
Trojans Dominate New Malware Development Sampled
May 07, 2012 Added by:Headlines
In the first quarter of 2012 alone, six million new malware samples were created, following the trend of increasingly of previous years. Trojans set a record as the preferred category of cybercriminals for carrying out information theft, representing 80 percent of new malware...
Comments (0)
Flashback - Are You Joking? There is No Malware for Mac!
April 23, 2012 Added by:Plagiarist Paganini
We must remember that in any software there will be vulnerabilities that could be exploited for criminal purposes. To give you an immediate idea of the malware available for the Mac environment, I produced a table that lists the main agents detected by a well known antivirus...
Comments (0)
Apple Releases Flashback Malware Removal Tool and Patches
April 17, 2012 Added by:Headlines
Apple has released a malware removal tool for the most common variant of the Flashback Trojan, as well as security updates to mitigate the vulnerability exploited by the malware for OS X Lion v10.7.3, OS X Lion Server v10.7.3. Mac OS X v10.6.8 and Mac OS X Server v10.6.8...
Comments (0)
SabPub - The Latest Mac OS X Backdoor Java Exploit
April 16, 2012 Added by:Headlines
"This new threat is a custom OS X backdoor, which appears to have been designed for use in targeted attacks... The backdoor contains functionality to make screenshots of the user’s current session and execute commands on the infected machine..."
Comments (0)
Zeus Trojan Takes Aim at Cloud Payroll Services
April 12, 2012 Added by:Headlines
"Zeus captures a screenshot of a Ceridian payroll services web page when a corporate user whose machine is infected... visits this website. This allows Zeus to steal the user id, password, company number and the icon selected by the user for the image-based authentication system..."
Comments (0)
Backdoor.Flashback Mac Virus Patch and Removal Tools
April 10, 2012 Added by:Headlines
Last week Doctor Web, found that the Flashback Mac Trojan has infected almost 600,000 systems, and has created an online tool to check to see if your machine is infected. F-Secure has released instructions on how to remove the virus if you are indeed infected...
Comments (0)
Campaign Targeting Activists Escalates with New Surveillance Malware
April 08, 2012 Added by:Electronic Frontier Foundation
The malware installs a remote administration tool called DarkComet RAT, which can capture webcam activity, disable the notification setting for certain antivirus programs, record key strokes, steal passwords, and more...
Comments (0)
- Reddit Names Allison Miller as Chief Information Security Officer (CISO)
- SecurityWeek Names Ryan Naraine as Editor-at-Large
- Why Cyber Security Should Be at the Top of Your Christmas List
- United States Federal Government’s Shift to Identity-Centric Security
- How Extreme Weather Will Create Chaos on Infrastructure
- BSIMM11 Observes the Cutting Edge of Software Security Initiatives
- Sustaining Video Collaboration Through End-to-End Encryption
- Will Robo-Helpers Help Themselves to Your Data?
- Securing the Hybrid Workforce Begins with Three Crucial Steps
- A New Strategy for DDoS Protection: Log Analysis on Steroids