Monday, November 30, 2015

Feedly:SANS Internet Storm Center, InfoCON: green. ISC StormCast for Tuesday, December 1st 2015 http://ift.tt/1XtyvPF, (Tue, Dec 1st)



from SANS Internet Storm Center, InfoCON: green

...(more)...

Feedly:Threat Research. China-based Cyber Threat Group Uses Dropbox for Malware Communications and Targets Hong Kong Media Outlets



from Threat Research

Feedly:Security News - Software vulnerabilities, data leaks, malware, viruses. High-tech Barbie stokes privacy fears



from Security News - Software vulnerabilities, data leaks, malware, viruses

The new Barbie doll is "intelligent" and connected. Too connected for some privacy activists.

Feedly:Security News - Software vulnerabilities, data leaks, malware, viruses. Info on five million VTech customers and kids exposed in breach



from Security News - Software vulnerabilities, data leaks, malware, viruses

Kid's technology maker VTech says the personal information of about 5 million of its customers and their children may have been stolen by hackers.

Feedly:Malwarebytes Unpacked. A Week in Security (Nov 22 – Nov 28)



from Malwarebytes Unpacked

A compilation of notable security news and blog posts from November 22 to 28.

Categories:

Tags:

(Read more...)

Feedly:Security News - Software vulnerabilities, data leaks, malware, viruses. US ends bulk collection of phone data



from Security News - Software vulnerabilities, data leaks, malware, viruses

The US government has halted its controversial program to collect vast troves of information from Americans' phone calls, a move prompted by the revelations of former intelligence analyst Edward Snowden.

Feedly:SANS Internet Storm Center, InfoCON: green. SHA1 Phase Out Overview, (Mon, Nov 30th)



from SANS Internet Storm Center, InfoCON: green

SHA1 (Secure Hashing Algorithm 1) has been in use for about 20 years. More recently, some weaknes ...(more)...

Feedly:Errata Security. First Internet ecommerce was at least 1990



from Errata Security

Feedly:Darknet - The Darkside. LSAT – Linux Security Auditing Tool



from Darknet - The Darkside

Feedly:Security News - Software vulnerabilities, data leaks, malware, viruses. EU anti-terror chief urges accord on passenger data collection by year end



from Security News - Software vulnerabilities, data leaks, malware, viruses

EU counter-terror chief Gilles de Kerchove called Monday for the European parliament to secure an agreement with member states that would require airlines to share passenger data by the end of the year.

Feedly:We Live Security » Languages » English. 5 million VTech customers affected by major data breach



from We Live Security » Languages » English

VTech announced that its Learning Lodge website was attacked by cybercriminals, affecting up to five million customers.

The post 5 million VTech customers affected by major data breach appeared first on We Live Security.

Feedly:We Live Security » Languages » English. Different nations’ online banking habits: better safe than sorry?



from We Live Security » Languages » English

When it comes to online banking, the UK and the US leads the way with security – over 70% of Brits and Americans have software installed on their device.

The post Different nations’ online banking habits: better safe than sorry? appeared first on We Live Security.

Feedly:We Live Security » Languages » English. The security review: Biometrics, Dridex in Europe and online payments



from We Live Security » Languages » English

From biometrics to Dridex in Europe and a fascinating insight into how different nations pay for things online - this week's security review is a busy one.

The post The security review: Biometrics, Dridex in Europe and online payments appeared first on We Live Security.

Feedly:Threats RSS Feed - Symantec Corp.. Adware.Dealply!gen3



from Threats RSS Feed - Symantec Corp.

Risk Level: Very Low.

Feedly:We Live Security » Languages » English. Online banking on-the-move? For most it’s a no-go



from We Live Security » Languages » English

What environment do you consider the safest for online banking? Would you make your financial transactions solely in the safety of your own home, or would you be less concerned about security on-the-go or in the office?

The post Online banking on-the-move? For most it’s a no-go appeared first on We Live Security.

Friday, November 27, 2015

Feedly:Threats RSS Feed - Symantec Corp.. Trojan.Melongad



from Threats RSS Feed - Symantec Corp.

Risk Level: Very Low. Type: Trojan.

Feedly:Malwarebytes Unpacked. V3 Technology Awards 2015



from Malwarebytes Unpacked

Good news from London. Today might be Black Friday, but I'm feeling pretty bright after finding out the folks over at V3.co.uk have honored me with this years 'Technology Hero of The Year' Award.

Categories:

Tags:

(Read more...)

Feedly:Darknet - The Darkside. Zarp – Network Attack Tool



from Darknet - The Darkside

Feedly:Security News - Software vulnerabilities, data leaks, malware, viruses. 'Romance fraud' warning from UK police after £1.6m scam



from Security News - Software vulnerabilities, data leaks, malware, viruses

London's Metropolitan Police on Friday warned singletons to beware of online dating scams after two men were convicted of duping a woman out of £1.6 million (2.3 million euros, $2.4 million).

Feedly:We Live Security » Languages » English. Is the UK’s Trident nuclear program at risk from cyberattack?



from We Live Security » Languages » English

Former British defence secretary Des Brown called on the British Prime Minister to hold an ‘end-to-end assessment’ of the Trident nuclear program’s cybersecurity, or risk potential weaknesses in the system.

The post Is the UK’s Trident nuclear program at risk from cyberattack? appeared first on We Live Security.

Feedly:Malwarebytes Unpacked. Steam’s “Exploration Sale” Gamifies Security Settings



from Malwarebytes Unpacked

The latest Steam Sale brings with it some additional security requirements to make full use of certain community features.

Categories:

Tags:

(Read more...)

Feedly:We Live Security » Languages » English. Online payment trends: Credit cards for Americans, PayPal for Europeans



from We Live Security » Languages » English

According to a new survey from ESET, the Europeans are leading the way with the online payment methods. Americans meanwhile prefer traditional alternatives.

The post Online payment trends: Credit cards for Americans, PayPal for Europeans appeared first on We Live Security.

Feedly:Security News - Software vulnerabilities, data leaks, malware, viruses. The next war will be an information war, and we're not ready for it



from Security News - Software vulnerabilities, data leaks, malware, viruses

In the 21st century the familiar form of warfare in which physical damage is meted out against the opponent's military forces and infrastructure has become only one form of attack. Instead, states are increasingly launching non-lethal attacks against an enemy's information systems – this is the rise of information warfare.

Feedly:We Live Security » Languages » English. Police arrest couple suspected of running malware encryption service



from We Live Security » Languages » English

British police arrested a man and a woman earlier this week, suspected of operating a website which offered services to online criminals which could help them evade detection by anti-virus software.

The post Police arrest couple suspected of running malware encryption service appeared first on We Live Security.

Feedly:We Live Security » Languages » English. Top ‘tips’ on how to survive Black Friday



from We Live Security » Languages » English

Follow these top 'tips' if you're looking to strike it lucky in a shopping mall on Black Friday. Or, if you're opting for 21st century convenience, then please be cyber-aware when shopping online.

The post Top ‘tips’ on how to survive Black Friday appeared first on We Live Security.

Feedly:Malwarebytes Unpacked. FrameFox: Nominated for the Most Aggressive EULA



from Malwarebytes Unpacked

We talk about one of the most outrageous EULA's we have seen so far. FrameFox aka Duuqu steals the show and gets nominated in the "Most aggressive" category.

Categories:

Tags:

(Read more...)

Feedly:Malwarebytes Unpacked. Reader’s Digest and other WordPress Sites Compromised, Push Angler EK



from Malwarebytes Unpacked

Reader's Digest is among the latest compromised sites pushing Angler EK.

Categories:

Tags:

(Read more...)

Thursday, November 26, 2015

Feedly:Threats RSS Feed - Symantec Corp.. Backdoor.Surge



from Threats RSS Feed - Symantec Corp.

Risk Level: Very Low. Type: Trojan.

Feedly:Threats RSS Feed - Symantec Corp.. Infostealer.Dyre!g2



from Threats RSS Feed - Symantec Corp.

Risk Level: Very Low. Type: Trojan.

Feedly:SANS Internet Storm Center, InfoCON: green. Known “Good” DNS, An Observation, (Thu, Nov 26th)



from SANS Internet Storm Center, InfoCON: green

This has come up enough it seems worth noting for this U.S ...(more)...

Feedly:Security News - Software vulnerabilities, data leaks, malware, viruses. Machine learning and big data know it wasn't you who just swiped your credit card



from Security News - Software vulnerabilities, data leaks, malware, viruses

You're sitting at home minding your own business when you get a call from your credit card's fraud detection unit asking if you've just made a purchase at a department store in your city. It wasn't you who bought expensive electronics using your credit card – in fact, it's been in your pocket all afternoon. So how did the bank know to flag this single purchase as most likely fraudulent?

Feedly:We Live Security » Languages » English. MagSpoof device ‘capable of predicting Amex credit card numbers’



from We Live Security » Languages » English

Developed by Samy Kamkar, MagSpoof is a multipurpose device that “emulates” the magnetic stripe on any credit card, as well as being able to predict Amex credit card numbers.

The post MagSpoof device ‘capable of predicting Amex credit card numbers’ appeared first on We Live Security.

Feedly:Darknet - The Darkside. Dell Backdoor Root Cert – What You Need To Know



from Darknet - The Darkside

Feedly:We Live Security » Languages » English. How your nationality may influence your online Black Friday shopping



from We Live Security » Languages » English

When it comes to shopping online, Germany is the most security conscious country in the world – most will use a security solution to thwart cybercriminals.

The post How your nationality may influence your online Black Friday shopping appeared first on We Live Security.

Wednesday, November 25, 2015

Feedly:Microsoft Malware Protection Center. Shields up on potentially unwanted applications in your enterprise



from Microsoft Malware Protection Center

Has your enterprise environment been bogged down by a sneaky browser-modifier which tricked you into installing adware from a seemingly harmless software bundle? Then you might have already experienced what a potentially unwanted application (PUA) can do.

The good news is, the new opt-in feature for enterprise users in Windows can spot and stop PUA in its tracks. If you are an enterprise user, and you are running System Center Endpoint Protection (SCEP), or Forefront Endpoint Protection (FEP), it's good to know that your infrastructure can be protected from PUA installations when you opt-in to the PUA protection feature.  If enabled, PUA will be blocked at download and install time.

 

What is PUA and why bother?

Potential Unwanted Application (PUA) refers to unwanted application bundlers or their bundled applications.

These applications can increase the risk of your network being infected with malware, cause malware infections to be harder to identify among the noise, and can waste helpdesk, IT, and user time cleaning up the applications.

Since the stakes are higher in an enterprise environment, the potential disaster that PUA brings can be a cause of concern. Hence, it is important to deliver trusted protection in this field.

Typical examples of behavior that we consider PUA include ad-injection, many types of software bundling, and persistent solicitation for payment for services based on fraudulent claims.

 

PUA protection for enterprise

The Potentially Unwanted Application protection feature is available only for enterprise customers.  If you are already one of Microsoft's existing enterprise customers, you need to opt-in to enable and use PUA protection.

PUA protection updates are included as part of the existing definition updates and cloud protection for Microsoft's enterprise customers. No additional configuration is required besides opting into PUA protection.

 

Deploying PUA protection

Systems administrators can deploy the PUA protection feature as a Group Policy setting by the following registry key policy setting according to your product version:

System Center Endpoint Protection, Forefront Endpoint Protection

Key Path:            HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Microsoft Antimalware\MpEngine

Value Name:      MpEnablePus

 

Note: The following configuration is available for machines that are managed by System Center Endpoint Protection.

Windows Defender

Key Path:            HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\MpEngine

Value Name:      MpEnablePus

 

The group policy value for MpEnablePus can be configured as a DWORD type as follows:

Value (DWORD)    Description
 0 (default) Potentially Unwanted Application protection is disabled
1 Potentially Unwanted Application protection is enabled. The applications with unwanted behavior will be blocked at download and install-time.

 

After enabling this feature, PUA blocking takes effect on endpoint clients after the next signature update or computer restart. Signature updates take place daily under typical circumstances.

The user experience can vary according to the policy settings that are configured in your enterprise. However, when enabled, the default behavior is that PUA will be blocked and automatically quarantined.

 

PUA threat file-naming convention

When enabled, we will start identifying unwanted software with threat names that start with “PUA:”, such as, PUA:Win32/Creprote.

Specific researcher-driven signatures identify the following:

  • Software bundling technologies
  • PUA applications
  • PUA frameworks

 

What does PUA protection look like?

By default, PUA protection quarantines the file so they won’t run. PUA will be blocked only at download or install-time. A file will be included for blocking if it meets one of the following conditions:

  • The file is being scanned from the browser
  • The file has Mark of the Web set
  • The file is in the %downloads% folder
  • Or if the file in the %temp% folder

 

The user experience of the blocking depends on the product you have installed.

With System Center Endpoint Protection deployed, the following dialog box will be shown upon detection:

SCEP dialog box indicates detection status

 The user can view the blocked software in the History tab.

You can take a look at the list of blocked applications from the History tab

In Windows 10, where its endpoints including Windows Defender are managed, the following dialog box will be shown:

Detection message in Windows Defender

PUA protection roll-out scenario

Like all good processes, it is best to plan your PUA protection deployment to get the most out of it. Here are some best practices to plan your PUA protection roll-out.

As blocking PUA in your enterprise is an explicit choice, it is best practice to do the necessary due diligence such as having a corporate policy or guidance that defines that potentially unwanted applications are not to be installed or downloaded in your corporate environment.

With a corporate policy or guidance in place, it's recommended to also sufficiently inform your end-users and your IT Helpdesk about the updated policy or guidance so that they are aware that potentially unwanted applications are not allowed in your corporate environment. This will preemptively inform your end-users as to why SCEP or FEP is blocking their download. By informing your helpdesk about your new policy or guidance, they can resolve end-user questions.

Finally, if you expect a lot of end-users in your environment to be downloading or installing PUA, then it is recommended that machines be gradually enrolled into the PUA protection. In other words, deploy the PUA opt-in policy to a subset of machines, observe the number of detections, determine if you'd want to allow any of them in your enterprise, add exclusions for them (all exclusions mechanisms are supported - file name, folder, extension, process) and then gradually roll-out the opt-in policy to a larger set of machines

 

Handling false positives

If you think that an application has been wrongfully identified as PUA, submit the file here, and add ‘PUA’ along with the detection name in the comments section.

 

We look forward to providing you with a great protection experience.

Geoff McDonald, Deepak Manohar, and Dulce Montemayor

MMPC

Feedly:SANS Internet Storm Center, InfoCON: green. Malicious spam - Subject: RE: Bill, (Wed, Nov 25th)



from SANS Internet Storm Center, InfoCON: green

Introduction

Earlier today (Wednesday2015-11-25), one of our ...(more)...

Feedly:. Como a minha TV foi infectada com ransomware e o que você pode aprender com esta experiência



from

Uma análise sobre algumas das formas em que a sua nova Smart TV pode ser alvo de ataques cibernéticos.
Twitter Card Style: 
summary

smart-tv-header_0.jpg

read more

Feedly:Security News - Software vulnerabilities, data leaks, malware, viruses. Amazon orders reset for some customers' passwords



from Security News - Software vulnerabilities, data leaks, malware, viruses

Amazon.com has required an undisclosed number of customers to reset passwords to their online accounts after the company said some passwords "may have been improperly stored" on devices.

Feedly:We Live Security » Languages » English. 4 top security tips for parents



from We Live Security » Languages » English

This introductory guide to online safety offers parents some useful security tips on how to protect their children.

The post 4 top security tips for parents appeared first on We Live Security.

Feedly:TrendLabs Security Intelligence Blog. DRIDEX Spam Runs Resurface Against US Targets



from TrendLabs Security Intelligence Blog

DRIDEX is steadily regaining its footing in the US just over a month after its takedown orchestrated by US and UK law enforcement agencies. Taking down servers is a significant step in crippling botnets, but unless all infrastructure are destroyed and all threat actors are caught, threats like DRIDEX are bound to resurface. As such, it...

Feedly:We Live Security » Languages » English. Amazon ‘resets customer passwords’ as Black Friday approaches



from We Live Security » Languages » English

Amazon has reportedly reset a number of customer passwords, causing some concern as Black Friday and Cyber Monday are just around the corner.

The post Amazon ‘resets customer passwords’ as Black Friday approaches appeared first on We Live Security.

Feedly:Fortinet Blog. FAKBEN Team Ransomware Uses Open Source “Hidden Tear” Code



from Fortinet Blog

Earlier this month, a new ransomware-as-a-service (RaaS) from a group called “FAKBEN Team” emerged. In this post, we will talk about our findings on the ransomare binary that they sell on their website. Our analysis indicates that the enc...

Feedly:Threats RSS Feed - Symantec Corp.. PHP.Filesman



from Threats RSS Feed - Symantec Corp.

Risk Level: Very Low. Type: Trojan.

Feedly:Data Breach Watch. Surprise, Surprise- Humans are a Data Security Nightmare



from Data Breach Watch

Otherwise known as employee negligence, most organizations still feel as though human error is their top threat to information security (cyber criminals came in second). While humans can’t be error-proofed any more than technology can, there are a few steps you can take to help your workforce, customers and vendors keep your organization and its […]

The post Surprise, Surprise- Humans are a Data Security Nightmare appeared first on Data Breach Watch.



Tags:  

Del.icio.us
Facebook
TweetThis
Digg
StumbleUpon


Copyright © Data Breach Watch [Surprise, Surprise- Humans are a Data Security Nightmare], All Right Reserved. 2015.

Feedly:Security News - Software vulnerabilities, data leaks, malware, viruses. Why government and tech can't agree about encryption



from Security News - Software vulnerabilities, data leaks, malware, viruses

Your phone is getting better and better at protecting your privacy. But Uncle Sam isn't totally comfortable with that, because it's also complicating the work of tracking criminals and potential national-security threats.

Feedly:Virus alerts. Free file decryption assistance—only for PCs protected by Dr.Web at the moment of infection



from Virus alerts

November 25, 2015

Our anti-virus laboratory receives an enormous number of requests for decryption―including those from users who purchased a Dr.Web license after an infection occurred. Meanwhile, starting with Dr.Web for Windows version 9, the anti-virus solution incorporates the Preventive Protection and Data Loss Prevention features which help prevent valuable information from getting damaged by encryption ransomware. Please recall that in most cases, decryption is not possible―even when contacting Doctor Web’s technical support service for assistance.

In accordance with the new rules, a user must have Dr.Web Security Space or Dr.Web Anti-virus for Windows 9.0 (or later), Dr.Web Enterprise Security Suite (v.6+) installed and operating under an active commercial license.

As before, free decryption services are only available for owners of active Dr.Web commercial licenses, the only amendment now being that the license must have been purchased before, not after the infection has been caused by encryption ransomware.

Please note that we strongly recommend that you do not pay attackers a ransom for decryption. For more information about encryption ransomware and the measures that should be taken in the event of infection, read our article "Encryption ransomware—Threat № 1".

You can request decryption here.

Feedly:Security News - Software vulnerabilities, data leaks, malware, viruses. Hilton hotels hit by cyber attack



from Security News - Software vulnerabilities, data leaks, malware, viruses

US hotel chain Hilton revealed Tuesday that hackers infected some of its point-of-sale computer systems with malware crafted to steal credit card information.

Tuesday, November 24, 2015

Feedly:Malwarebytes Unpacked. New Website Ransomware Variant Demands $999



from Malwarebytes Unpacked

Website owners are targeted with ransomware, this one asking for $999.

Categories:

Tags:

(Read more...)

Feedly:SANS Internet Storm Center, InfoCON: green. ISC StormCast for Wednesday, November 25th 2015 http://ift.tt/1Nc6ntu, (Wed, Nov 25th)



from SANS Internet Storm Center, InfoCON: green

...(more)...

Feedly:. Dell computers affected by eDellRoot self-signed root certificate



from

Dell computers with the eDellRoot root certificate may allow attackers to sign SSL/TLS certificates as legitimate sources and can be vulnerable to man-in-the-middle attacks.
Twitter Card Style: 
summary

Header-image06.jpg

read more

Feedly:Threats RSS Feed - Symantec Corp.. Trojan.Ranscrypt.U!g2



from Threats RSS Feed - Symantec Corp.

Risk Level: Very Low. Type: Trojan.

Feedly:Malwarebytes Unpacked. The Road to Black Friday: Stats and Security Tips



from Malwarebytes Unpacked

With Thanksgiving weekend just a few sleeps away, one can’t help but feel the air charged with a little excitement—perhaps, even a little danger.

Categories:

Tags:

(Read more...)

Feedly:Fortinet Blog. The Top 5 Threat Predictions For 2016 From FortiGuard Labs



from Fortinet Blog

It’s an annual tradition that security vendors and pundits alike can’t resist: threat predictions for the coming year. However, this is much more than an exercise in crystal ball gazing. Vendors need to accurately predict changes in the t...

Feedly:Malwarebytes Unpacked. Video Ads: Malvertising’s Next Frontier?



from Malwarebytes Unpacked

Dissecting a two month long malvertising campaign via video ads.

Categories:

Tags:

(Read more...)

Feedly:Microsoft Malware Protection Center. ​​Does prevalence matter? A different approach to traditional antimalware test scoring



from Microsoft Malware Protection Center

Most well-known antimalware tests today focus on broad-spectrum malware.  In other words, tests include malware that is somewhat indiscriminate (isn't necessarily targeted), at least somewhat prevalent and sometimes very prevalent. Typically, tests are not focused on specialized threats that are highly targeted, and most avoid including programs that walk the line between good and evil, such as adware and other programs that we call unwanted software as opposed to malware.  Files that are in most test sets are files that antimalware vendors agree a customer would never want and are generally pervasive in the ecosystem.

The traditional test score counts each file equally. That is, if there are 100 files, each file is worth 1% of the test.  In the real world, however, people don't encounter malware at exactly the same rate. Some malware is incredibly prevalent while other malware families are not as pervasive.  Likewise, some malware might focus on certain regional demographics or languages and not affect other parts of the world.  When it comes to real customer impact, not all malware has the same distribution or prevalence.  Yet, they are treated as such in traditionally scored tests.

Collaborating to create a more applicable scoring model

Microsoft has been partnering with AV-Comparatives to create a scoring model that incorporates prevalence to represent true customer impact.  At Virus Bulletin (VB) this year, Peter Stelzhammer (AV-Comparatives co-founder) and I presented this model.  Today, AV-Comparatives is releasing the prevalence-weighted results from the most recent file detection test.  This test compares detection rates of vendors against a very comprehensive malware set – 166k Portable Executable (PE) files.

After working with AV-Comparatives for many years, I have personally developed a great respect for the way they curate files for their tests. They work diligently to select files that are relevant, are not in that "unwanted" category (which vendors would lobby to dispute out of their test), and they are able to source hundreds of thousands of recent files for the test.  That said, one thing we found is that it is incredibly difficult, if you're using a traditional scoring model, to attempt to source a perfect number of files that represent ecosystem prevalence. 

For one, many malware families rely on non-PE components to spread. Jenxcus is a good example – its VBS (Visual Basic script) component is one of the most frequently blocked files on our customers' computers. However, its PE component is seen comparatively rarely, so it's quite difficult to source enough Jenxcus PE files for a test to equate to that family's ecosystem prevalence.  Samples from some families might be easier to source than others (more willing to be found or submitted to public sources).  These constraints make it practically impossible to select a test set that perfectly equates to the ecosystem.

Looking at the prevalence model

Enter the prevalence model.  AMTSO through the Realtime Threat List (RTTL) has been making strides lately to encourage vendors to share malware prevalence information with testers to help testers build better test sets.  While we have been moving toward critical mass and getting closer to the needed features to make that project work, Microsoft offered to sponsor AV-Comparatives and provide telemetry details from over 200 million computers in over 100 different countries to them to create a prevalence-weighted model.

The following chart shows how the test set stacks up to the ecosystem (# of files in comparison to ecosystem prevalence). 

 In general, files selected for the most prevalent malware families (those in the high category) were underrepresented using the traditional method of scoring and those in the low category were overrepresented

Figure 1:  In general, files selected for the most prevalent malware families (those in the high category) were underrepresented using the traditional method of scoring and those in the low category were overrepresented.

When you drill down a layer to the highly prevalent malware families, you can start to see why the numbers don't line up.  Some of the file infector families, like Sality and Virut, had a very large sample set (a great representation of the family in fact). However, other prevalent families, like Gamarue, Dorv, Jenxcus, and Sventore were underrepresented.  Sventore was new – there was only one file to represent that family.  Gamarue, Dorv, and especially Jenxcus didn't have nearly enough recent PE files available for the test to allow them to equate to their ecosystem prevalence.

A tabulated sample of the test score impact

 Figure 2:  Another example of the test scores not lining up.

The prevalence-weighted model takes into account the prevalence of the tested file, the malware family associated with the file, and the malware family's partition (high, moderate, low, very low) to calculate each file's impact to the test which balances the score with the actual customer impact in the ecosystem.

For more details about the exact calculation method, you can see the AV-Comparatives report released today.

The charts above show how the prevalence model balanced test scores to make them more accurately represent a vendor's detection capabilities.  In essence, missed files were scored to represent the malware people were more likely to encounter, which is good information for consumers.  However, prevalence-weighting the score can mean that vendors (at least those who monitor malware prevalence) might have very similar test scores.  Therefore, additional context is probably needed to help consumers make decisions.

Geolocation is one context we analyzed. In the report, we broke down vendor test scores by country using each country's malware prevalence profile. There are some examples of vendors that did great in some countries and not so great in others. Scores didn't always line up with vendors that were co-located in the target region.  If you're interested in a specific country, be sure to check out AV-Comparative's regional maps in the report.

Organizations, especially those that might have special security concerns, might need other differentiation.  After Peter and I presented at VB this year, we got lots of great feedback from people at the conference.  One of the ideas we discussed was differentiating malware prevalence specifically affecting enterprises and even showing the differences between verticals.  Other discussions centered around showing detection differences by type of threat – ransomware in comparison to information stealers, etc.

Prevalence is but one model that provides additional insight to help people make better-informed decisions when choosing their protection provider. Through partnerships like this one with AV-Comparatives and others in the industry, productive discussions and innovative models result in even better antimalware testing and provide greater benefits to consumers and enterprises alike. 

Holly Stewart

MMPC

Feedly:We Live Security » Languages » English. New Dridex campaign achieves high infection ratio in European countries



from We Live Security » Languages » English

When discussing banking trojans these days, Dridex is the one that everybody seems to be talking about the most. This trojan has inherited the popularity of the ancient Zeus trojan and is one of the biggest threats that we can find right now, in constant evolution to become more efficient.

The post New Dridex campaign achieves high infection ratio in European countries appeared first on We Live Security.

Feedly:Threats RSS Feed - Symantec Corp.. Trojan.Cryptolocker.W!gm



from Threats RSS Feed - Symantec Corp.

Risk Level: Very Low. Type: Trojan.

Feedly:. How my TV got infected with ransomware and what you can learn from it



from

A look at some of the possible ways your new smart TV could be the subject of cyberattacks.
Twitter Card Style: 
summary

smart-tv-header_0.jpg

read more

Feedly:We Live Security » Languages » English. You are 6 security steps away from Black Friday brilliance



from We Live Security » Languages » English

Black Friday and Cyber Monday promise to offer some fantastic deals at low prices. But it’s also a time of year when cybercriminal scams are aplenty. Here’s what you should do to do to shop safely.

The post You are 6 security steps away from Black Friday brilliance appeared first on We Live Security.

Feedly:We Live Security » Languages » English. Dell root certificate vulnerability leaves users open to attack



from We Live Security » Languages » English

Dell has confirmed that a root certificate vulnerability that is present on some of its laptops and computers, means they can be exploited by cybercriminals.

The post Dell root certificate vulnerability leaves users open to attack appeared first on We Live Security.

Feedly:Securelist - Information about Viruses, Hackers and Spam. Wake up! You’ve been p0wned



from Securelist - Information about Viruses, Hackers and Spam

Be careful when selecting apps and when it comes to your much-loved devices.

Feedly:IOC Bucket OpenIOC 1.0 Latest Ten. openioc for sample: f760def159cf76bd0dd83cc4ecac17474b02aec6



from IOC Bucket OpenIOC 1.0 Latest Ten

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

Feedly:Fortinet Blog. Dell eDellRoot SuperFish-like Caught



from Fortinet Blog

If you recall last February, Lenovo came under significant scrutiny when it was found that SuperFish adware was preinstalled on many of its notebooks. This week, some researchers shared that Dell, the third biggest personal computer vendor accor...

Monday, November 23, 2015

Feedly:SANS Internet Storm Center, InfoCON: green. ISC StormCast for Tuesday, November 24th 2015 http://ift.tt/1N57neB, (Tue, Nov 24th)



from SANS Internet Storm Center, InfoCON: green

...(more)...

Feedly:SANS Internet Storm Center, InfoCON: green. Superfish 2.0: Dell Windows Systems Pre-Installed TLS Root CA, (Tue, Nov 24th)



from SANS Internet Storm Center, InfoCON: green

Recently shipped Dell systems have been found to include a special Root CA Certificate and privat ...(more)...

Feedly:SANS Internet Storm Center, InfoCON: green. BizCN gate actor sends CryptoWall 4.0, (Tue, Nov 24th)



from SANS Internet Storm Center, InfoCON: green

Introduction

Earlier this month, the BizCN gate actor switche ...(more)...

Feedly:Malwarebytes Unpacked. A Week in Security (Nov 15 – Nov 21)



from Malwarebytes Unpacked

A compilation of notable security news and blog posts from November 15 to 21.

Categories:

Tags:

(Read more...)

Feedly:Errata Security. Some notes on the eDellRoot key



from Errata Security

Feedly:Malwarebytes Unpacked. Catching Up With The ‘EITest’ Compromise, A Year Later



from Malwarebytes Unpacked

Familiar Attack Hits WordPress Sites, Pushes Angler EK.

Categories:

Tags:

(Read more...)

Feedly:Threats RSS Feed - Symantec Corp.. Unix.Ransomcrypt.B



from Threats RSS Feed - Symantec Corp.

Risk Level: Very Low. Type: Trojan.

Feedly:Darknet - The Darkside. Rekall – Memory Forensic Framework



from Darknet - The Darkside

Feedly:We Live Security » Languages » English. Is biometrics the future of secure payments?



from We Live Security » Languages » English

Is the idea of biometrics as a secure payment system a fad, fiction or fact? This feature looks at whether DNA is linked with our digital identity.

The post Is biometrics the future of secure payments? appeared first on We Live Security.

Feedly:We Live Security » Languages » English. UK Cyber Security Academy will boost cyberattack resilience



from We Live Security » Languages » English

The newly launched Cyber Security Academy in the UK will deliver comprehensive solutions and insight to all types of sophisticated cyberattacks.

The post UK Cyber Security Academy will boost cyberattack resilience appeared first on We Live Security.

Feedly:TrendLabs Security Intelligence Blog. Prototype Nation: Emerging Innovations in Cybercriminal China



from TrendLabs Security Intelligence Blog

Cybercrime doesn’t wait for anything or anyone. Two years after publishing our last report on the wares and services traded in the bustling Chinese underground, we found that the market’s operations have further expanded. From traditional malware, Chinese cybercriminals are now looking toward newer innovations and technologies to boost their operations. The Chinese underground now...

Feedly:TrendLabs Security Intelligence Blog. Trend Micro, NCA Partnership Leads to Arrests and Shutdown of Refud.me and Cryptex Reborn



from TrendLabs Security Intelligence Blog

A male and a female, both aged 22 and hailing from Colchester, Essex in the United Kingdom, were arrested on suspicion of operating two services featured in many malware business models – the popular counter antivirus (CAV) service Refud.me and the crypting service Cryptex Reborn. Both services have been taken down thanks to the partnership of Trend Micro’s...

Feedly:We Live Security » Languages » English. The security review: Virtualization, diversity and encryption



from We Live Security » Languages » English

Get up-to-date with the latest happenings in information security with our review of the past week.

The post The security review: Virtualization, diversity and encryption appeared first on We Live Security.

Saturday, November 21, 2015

Friday, November 20, 2015

Feedly:Malwarebytes Unpacked. Vonteera Adware Uses Certificates to Disable Anti-Malware



from Malwarebytes Unpacked

Vonteera crossed a line when it decided to actively disable anti-malware and anti-virus software. They used certificates to pull that off.

Categories:

Tags:

(Read more...)

Web Analytics