Saturday, January 30, 2016

Feedly:TaoSecurity. New Books, and Even Audio and Video Courses, Added to Library Sale



from TaoSecurity

Feedly:Security News - Software vulnerabilities, data leaks, malware, viruses. A look at federal cases on handling classified information



from Security News - Software vulnerabilities, data leaks, malware, viruses

News that Hillary Clinton's home email server contained top-secret messages brings renewed attention to the security of her mail system and to the laws and regulations that control classified information.

Feedly:SANS Internet Storm Center, InfoCON: green. All CVE Details at Your Fingertips, (Sat, Jan 30th)



from SANS Internet Storm Center, InfoCON: green

CVE (Common Vulnerabilities and Exposure) is a system developed to provide structured data for in ...(more)...

Friday, January 29, 2016

Feedly:Malwarebytes Unpacked. App Update Tool Could Endanger iOS Users



from Malwarebytes Unpacked

Some iOS developers are integrating an update library called JSPatch, used for delivering faster updates to their apps. That's a great idea, but unfortunately, there are some serious security concerns involved.

Categories:

Tags:

(Read more...)

Feedly:Security News - Software vulnerabilities, data leaks, malware, viruses. Gov't declares 22 Clinton emails 'top secret'



from Security News - Software vulnerabilities, data leaks, malware, viruses

The Obama administration confirmed for the first time Friday that Hillary Clinton's unsecured home server contained closely guarded government secrets, censoring 22 emails with material requiring one of the highest levels of classification. The revelation comes just three days before the Iowa presidential nominating caucuses in which Clinton is a candidate.

Feedly:Darknet – The Darkside. hping3 – TCP/IP Packet Assembler & Analyser



from Darknet – The Darkside

Feedly:Malwarebytes Unpacked. Yontoo: PUPs with two faces



from Malwarebytes Unpacked

We take a look at the methods that the installers for Yontoo browser hijackers use to keep as much information about their program as possible away from security researchers.

Categories:

Tags:

(Read more...)

Feedly:Securelist - Information about Viruses, Hackers and Spam. From Linux to Windows – New Family of Cross-Platform Desktop Backdoors Discovered



from Securelist - Information about Viruses, Hackers and Spam

Recently we came across a new family of cross-platform backdoors for desktop environments. First we got the Linux variant, and with information extracted from its binary, we were able to find the variant for Windows desktops, too. Not only that, but the Windows version was additionally equipped with a valid code signing signature. Let´s have a look at both of them.

Feedly:We Live Security » Languages » English. HSBC’s online banking services hit with cyberattack



from We Live Security » Languages » English

HSBC in the UK has revealed via Twitter that its internet banking services were targeted by cybercriminals this morning (January 29th), which it has “successfully defended”.

The post HSBC’s online banking services hit with cyberattack appeared first on We Live Security.

Feedly:We Live Security » Languages » English. Businesses ‘still naive to the risks of cybercrime’



from We Live Security » Languages » English

Close to half all businesses in the UK are of the opinion that they are safe from cybercrime, according to new research. They believe the risks are minute.

The post Businesses ‘still naive to the risks of cybercrime’ appeared first on We Live Security.

Feedly:Threat Research. Dridex Botnet Resumes Spam Operations After the Holidays



from Threat Research

Feedly:SANS Internet Storm Center, InfoCON: green. Scripting Web Categorization, (Fri, Jan 29th)



from SANS Internet Storm Center, InfoCON: green

When you are dealing with a huge amount of data, it can be very useful to enhance them by adding ...(more)...

Thursday, January 28, 2016

Feedly:SANS Internet Storm Center, InfoCON: green. ISC Stormcast For Friday, January 29th 2016 http://ift.tt/1RPQXi2, (Fri, Jan 29th)



from SANS Internet Storm Center, InfoCON: green

...(more)...

Feedly:Malwarebytes Unpacked. Rotten Tomatoes, Jerusalem Post And Other Publishers Victim Of Ongoing Malvertising Campaign



from Malwarebytes Unpacked

Rogue advertisers are flying under the radar, pushing malicious ads.

Categories:

Tags:

(Read more...)

Feedly:Security News - Software vulnerabilities, data leaks, malware, viruses. Computer expert gets no jail time in extensive spamming case



from Security News - Software vulnerabilities, data leaks, malware, viruses

A Florida computer expert who helped send millions of spam messages to people to help computer marketers collect email addresses and phone numbers has been sentenced to two years' probation.

Feedly:The Citizen Lab. Bill Marczak on FinFisher in Australia



from The Citizen Lab

Citizen Lab Senior Research Fellow Bill Marczak spoke to ABC Australia regarding the proxy server for the remote intrusion software FinFisher found in Sydney, Australia.

The post Bill Marczak on FinFisher in Australia appeared first on The Citizen Lab.

Feedly:The Citizen Lab. Citizen Lab cited in report on malware campaign against Tibetan and Uyghur activists



from The Citizen Lab

Palo Alto Networks cited the Citizen Lab report entitled "Communities @ Risk: Targeted Threats Against Civil Society."

The post Citizen Lab cited in report on malware campaign against Tibetan and Uyghur activists appeared first on The Citizen Lab.

Feedly:Malwarebytes Unpacked. Elaborate iCloud Phish Used To Activate Stolen iPhones



from Malwarebytes Unpacked

Apple has a nifty feature which allows to remotely erase and lock your phone if you ever lose your iPhone and wanted to make sure your personal information would not fall into the wrong hands. This is an inconvenience for thieves who may want to resell those stolen phones on the black market, but crooks never lack imagination and seem to have found a way to circumvent this protection.

Categories:

Tags:

(Read more...)

Feedly:Threats RSS Feed - Symantec Corp.. Infostealer.Boyapki.D



from Threats RSS Feed - Symantec Corp.

Risk Level: Very Low. Type: Trojan.

Feedly:We Live Security » Languages » English. Wendy’s launches investigation into possible data breach



from We Live Security » Languages » English

The fast food chain Wendy's may have been the victim of a data breach, the security expert Brian Krebs has revealed. Unusual activity has been reported.

The post Wendy’s launches investigation into possible data breach appeared first on We Live Security.

Feedly:SANS Internet Storm Center, InfoCON: green. Dridex malspam example from January 2016, (Thu, Jan 28th)



from SANS Internet Storm Center, InfoCON: green

Introduction

I occasionally find malicious spam (malspam) tha ...(more)...

Feedly:Threat Research. CenterPOS: An Evolving POS Threat



from Threat Research

Feedly:We Live Security » Languages » English. Belong to the ‘selfie’ generation? You are probably oversharing



from We Live Security » Languages » English

The 'Selfie Generation', which shares every detail of their lives online, don’t realize that giving away too much information can have serious consequences.

The post Belong to the ‘selfie’ generation? You are probably oversharing appeared first on We Live Security.

Feedly:Security News - Software vulnerabilities, data leaks, malware, viruses. Game theoretic approaches up the ante on defending cybersecurity resources



from Security News - Software vulnerabilities, data leaks, malware, viruses

While the notion of "players," "actions," and "payoffs" may seem more suited to Las Vegas gaming tables, game theory as a mathematical tool has steadily grown in cyber defense applications. In ongoing and progressive work being conducted under PNNL's Asymmetric Resilient Cybersecurity initiative, scientists have taken on the challenge of addressing the sources and types of uncertainty that can arise in realizing a resilient cyber system. Already, their work on quantifying uncertainties in cyber attacker payoffs within randomly determined security games has been recognized with an IEEE Best Paper award. Meanwhile, their latest publication presents a probabilistic modeling framework for representing and propagating uncertainties in cyber attacker payoffs with the added goal of increasing awareness among researchers about this problem domain.

Feedly:Securelist - Information about Viruses, Hackers and Spam. Kaspersky DDoS Intelligence Report for Q4 2015



from Securelist - Information about Viruses, Hackers and Spam

In Q4 2015, resources in 69 countries were targeted by DDoS attacks. The largest numbers of DDoS attacks targeted victims in China, the US and South Korea. The longest DDoS attack in Q4 2015 lasted for 371 hours.

Feedly:Threats RSS Feed - Symantec Corp.. Backdoor.Adwind!g1



from Threats RSS Feed - Symantec Corp.

Risk Level: Very Low. Type: Trojan.

Feedly:Securelist - Information about Viruses, Hackers and Spam. BlackEnergy APT Attacks in Ukraine employ spearphishing with Word documents



from Securelist - Information about Viruses, Hackers and Spam

Few days ago, we came by a new document that appears to be part of the ongoing attacks BlackEnergy against Ukraine. Unlike previous Office files used in the recent attacks, this is not an Excel workbook, but a Microsoft Word document.

Feedly:We Live Security » Languages » English. ‘Application not compatible': Bayrob may be stealing your info



from We Live Security » Languages » English

In this post, ESET's Josep Albors analyzes Bayrob, a trojan that has been intensely targeting users across the world since mid-December, 2015.

The post ‘Application not compatible': Bayrob may be stealing your info appeared first on We Live Security.

Wednesday, January 27, 2016

Feedly:SANS Internet Storm Center, InfoCON: green. ISC Stormcast For Thursday, January 28th 2016 http://ift.tt/1SkmNSt, (Thu, Jan 28th)



from SANS Internet Storm Center, InfoCON: green

...(more)...

Feedly:Security News - Software vulnerabilities, data leaks, malware, viruses. Researchers have discovered multiple botnets



from Security News - Software vulnerabilities, data leaks, malware, viruses

Ben-Gurion University of the Negev cyber security researchers have discovered and traced approximately six botnets by analyzing data collected from past cyber attacks. The research was conducted at Deutsche Telekom Innovation Labs@BGU and was announced at Cybertech 2016 in Tel Aviv today.

Feedly:Errata Security. Net ring-buffers are essential to an OS



from Errata Security

Feedly:SANS Internet Storm Center, InfoCON: green. SYN-ACK Packets With Data, (Wed, Jan 27th)



from SANS Internet Storm Center, InfoCON: green

We havent had an event like this in a while. ...(more)...

Feedly:Errata Security. How not to be a better programmer



from Errata Security

Feedly:Darknet – The Darkside. PayPal Remote Code Execution Vulnerability Patched



from Darknet – The Darkside

Feedly:. Android ransomware variant uses clickjacking to become device administrator



from

Android.Lockdroid.E poses as a porn app and tricks users into giving it admin rights. Almost 67 percent of Android devices are at risk.
Twitter Card Style: 
summary

Header-image16.jpg

Contributor: Shaun Aimoto

read more

Feedly:We Live Security » Languages » English. Businesses increasingly targeted with ransomware



from We Live Security » Languages » English

Cybercriminals are increasingly targeting businesses with ransomware, according to a new report by the Online Trust Alliance.

The post Businesses increasingly targeted with ransomware appeared first on We Live Security.

Feedly:SANS Internet Storm Center, InfoCON: green. Couple updates and reminders, (Wed, Jan 27th)



from SANS Internet Storm Center, InfoCON: green

We still got two surveys running, and will probably close them out soon:

Our year end, ...(more)...

Feedly:Security News - Software vulnerabilities, data leaks, malware, viruses. Could encryption 'backdoors' safeguard privacy and fight terror online?



from Security News - Software vulnerabilities, data leaks, malware, viruses

Since so much of life has moved online, a clash has emerged between the opposing values of internet freedom, and internet control. Should the internet be a public arena free of all interference and influence from the authorities? Or does too much freedom result in anarchy, turning the internet into a safe haven for criminals and terrorists?

Feedly:Threat Research. Hot or Not? The Benefits and Risks of iOS Remote Hot Patching



from Threat Research

Feedly:We Live Security » Languages » English. Will your Swiss email account stay private (or can the govt take a look)?



from We Live Security » Languages » English

A referendum is to be held on Switzerland's proposed surveillance law, a decision lauded by supporters of privacy. ESET's Cameron Camp discusses further.

The post Will your Swiss email account stay private (or can the govt take a look)? appeared first on We Live Security.

Feedly:Fortinet Blog. Business Email Scam: How Much Does a Million Dollar Cost?



from Fortinet Blog

Earlier this month, the Daily Mail published an article regarding foreign crime gangs stealing millions through hacking email accounts of house buyers and sellers. The con is simple - use malware to steal email credentials, study the content of compr...

Feedly:Data Breach Watch. What’s the Problem With Forgotten Data?…EVERYTHING!



from Data Breach Watch

Regardless of industry, business deal with tons of data on a daily basis. Have you ever wondered what happens to that data? It’s used, filed away and forgotten — but what does that mean in relation to your business down the road? A majority of today’s data breaches involve forgotten data, which means it’s that […]

The post What’s the Problem With Forgotten Data?…EVERYTHING! appeared first on Data Breach Watch.



Tags:  

Del.icio.us
Facebook
TweetThis
Digg
StumbleUpon


Copyright © Data Breach Watch [What's the Problem With Forgotten Data?...EVERYTHING!], All Right Reserved. 2016.

Tuesday, January 26, 2016

Feedly:SANS Internet Storm Center, InfoCON: green. ISC Stormcast For Wednesday, January 27th 2016 http://ift.tt/1OXC3jZ, (Wed, Jan 27th)



from SANS Internet Storm Center, InfoCON: green

...(more)...

Feedly:TaoSecurity. 20 Best Tech Titles Left in My Library Sale



from TaoSecurity

Feedly:Malwarebytes Unpacked. Rogue Google Chrome Extension Spies On You



from Malwarebytes Unpacked

A fake calculator extension monitors your web browsing.

Categories:

Tags:

(Read more...)

Feedly:We Live Security » Languages » English. Google bans over 780m ‘bad ads’ to protect online experience



from We Live Security » Languages » English

Google has banned over 780 million so-called ‘bad ads’ in 2015 alone, explaining that these advertisements have breached the terms of their policies.

The post Google bans over 780m ‘bad ads’ to protect online experience appeared first on We Live Security.

Feedly:Malwarebytes Unpacked. More Fake Facebook “Security System Page” Scams…



from Malwarebytes Unpacked

We take a look at some variations on the same kind of Facebook scam currently doing the rounds.

Categories:

Tags:

(Read more...)

Feedly:Fortinet Blog. "Fractalizing" Security



from Fortinet Blog

Most people are familiar with fractals, if not by name but by appearance. Wikipedia defines a fractal as “…a natural phenomenon or a mathematical set that exhibits a repeating pattern that displays at every scale.” Perhaps the...

Feedly:Security News - Software vulnerabilities, data leaks, malware, viruses. Centene loses personal, health data of 950,000 members



from Security News - Software vulnerabilities, data leaks, malware, viruses

Health insurer Centene Corp. says it is missing half a dozen hard drives that contain the personal and health information of roughly 950,000 clients.

Feedly:Threats RSS Feed - Symantec Corp.. Trojan.Ransomcrypt.AB



from Threats RSS Feed - Symantec Corp.

Risk Level: Very Low. Type: Trojan.

Feedly:Threats RSS Feed - Symantec Corp.. Trojan.Cryptolocker.AD



from Threats RSS Feed - Symantec Corp.

Risk Level: Very Low. Type: Trojan.

Feedly:Fortinet Blog. Metamorphic Code In Ransomware



from Fortinet Blog

Ransomware is a category of malware that scrambles your files or lock your computer while asking for ransom.  We have encountered different versions of ransomware, and seen their effects.  We also have seen a different kind of ransomware th...

Feedly:Security News - Software vulnerabilities, data leaks, malware, viruses. First technology to detect back-and-forth-type targeted email attacks in real time



from Security News - Software vulnerabilities, data leaks, malware, viruses

Fujitsu today announced the development of technology that utilizes its artificial intelligence technology to detect targeted email attacks aimed at specific organizations in real time. In recent years, targeted attacks have become more sophisticated, with attackers cleverly camouflaging their contact as a work related matter, then attacking after gaining an employee's trust.

Feedly:Threat Research. URLZone Zones in on Japan



from Threat Research

Feedly:We Live Security » Languages » English. Windows exploitation in 2015



from We Live Security » Languages » English

Hacking Team exploits and new security features in Google Chrome and Microsoft Edge are just a few of the highlights of ESET's annual Windows exploitation in 2015 report.

The post Windows exploitation in 2015 appeared first on We Live Security.

Feedly:TrendLabs Security Intelligence Blog. Battling Business Email Compromise Fraud: How Do You Start?



from TrendLabs Security Intelligence Blog

In May 2014, an accountant to a Texas manufacturing firm received an email from a familiar correspondent, his company’s CEO. The email instructed him to wait for a call from a partner company and warned against sharing the email to anyone else for fear of regulation backlash. The company ended up losing US$ 480,000 to wire fraudsters who used the potent and very costly business email compromise (BEC) scam or CEO fraud. The firm is now suing its cyber insurer for not covering the loss.

Feedly:We Live Security » Languages » English. Tax Identity Theft Awareness Week in the US



from We Live Security » Languages » English

As Tax Identity Theft Awareness Week in the US gets underway, ESET's Stephen Cobb offers expert advice on how to protect yourself from fraudsters.

The post Tax Identity Theft Awareness Week in the US appeared first on We Live Security.

Monday, January 25, 2016

Feedly:. The rise of Japanese zero-click fraud



from

Scammers are using more aggressive tactics with new “zero-click” sites to try to con victims out of US$2,000.
Twitter Card Style: 
summary_large_image

zero-click-fraud-header.jpg

read more

Feedly:Malwarebytes Unpacked. Introducing the Malwarebytes Anti-Ransomware Beta



from Malwarebytes Unpacked

For the last four years, ransomware has evolved into one of the biggest threats to cyber security that I’ve seen in a long time. Names like CryptoLocker, CryptoWall, and CTBLocker keep average computer users and IT security Jedis alike up at night. For good reason: Ransomware is cunning, effective, and proliferating, and the cyber security […]

Categories:

Tags:

(Read more...)

Feedly:SANS Internet Storm Center, InfoCON: green. OpenSSL versions 1.0.2f, 1.0.1r to be released 28 Jan 2016, (Tue, Jan 26th)



from SANS Internet Storm Center, InfoCON: green

...(more)...

Feedly:SANS Internet Storm Center, InfoCON: green. Pentest Time Machine: NMAP + Powershell + whatever tool is next, (Tue, Jan 26th)



from SANS Internet Storm Center, InfoCON: green

Early on in many penetration test or security assessment, you will often find yourself wading thr ...(more)...

Feedly:SANS Internet Storm Center, InfoCON: green. ISC Stormcast For Tuesday, January 26th 2016 http://ift.tt/20pLBeG, (Tue, Jan 26th)



from SANS Internet Storm Center, InfoCON: green

...(more)...

Feedly:Malwarebytes Unpacked. A Week in Security (Jan 17 – Jan 23)



from Malwarebytes Unpacked

A compilation of notable security news and blog posts from January 17 to 23.

Categories:

Tags:

(Read more...)

Feedly:Darknet – The Darkside. RWMC – Retrieve Windows Credentials With PowerShell



from Darknet – The Darkside

Feedly:Security News - Software vulnerabilities, data leaks, malware, viruses. Easy prey for hackers—navigation systems



from Security News - Software vulnerabilities, data leaks, malware, viruses

When it comes to route planning, drivers have almost blind faith in GPS; the technology plays a crucial role in identifying location and time in the industry as well as in other areas. If hackers attack the system, they can cause great damage. Deploying several GPS receivers at the same time could solve the problem in certain areas of application.

Feedly:We Live Security » Languages » English. Hedge fund managers ‘need a cybersecurity response plan’



from We Live Security » Languages » English

Having in place a ‘cybersecurity response plan’ is vital if hedge fund managers in London are to deal effectively with this threat.

The post Hedge fund managers ‘need a cybersecurity response plan’ appeared first on We Live Security.

Feedly:Threat Research. Holiday Season 2015 Email Campaign



from Threat Research

Feedly:We Live Security » Languages » English. The security review: ESET’s trends for 2016, more attacks in Ukraine and virtualized security



from We Live Security » Languages » English

Highlights from the last seven days in information security include ESET’s latest trends report (In)security Everywhere and the ongoing cyberattacks against Ukraine’s electric power industry.

The post The security review: ESET’s trends for 2016, more attacks in Ukraine and virtualized security appeared first on We Live Security.

Feedly:Malware don't need Coffee. CVE-2015-8651 (Flash up to 20.0.0.228) and Exploit Kits



from Malware don't need Coffee

Feedly:Xanda's Blog !~!. How Did I Find APT16 New Infa with VirusTotal pDNS and a lil Bit of Luck



from Xanda's Blog !~!

[Quick and short update] Last couple of weeks, I was reading the The EPS Awakens – Part 2 blog entry from FireEye and found this one IP, 121.127.249.74, was previously used as their C2 server. I used VirusTotal IP information, these few domains appeared: 2015-07-01 frppl.com 2015-07-01 jrjfj.com 2015-07-01 pjntx.com 2015-07-01 vzflx.com 2015-07-01 yeaqm.com I […]

Sunday, January 24, 2016

Feedly:SANS Internet Storm Center, InfoCON: green. Cuckoo Sandbox 2.0 RC1 released http://ift.tt/1NmJv5U, (Mon, Jan 25th)



from SANS Internet Storm Center, InfoCON: green

...(more)...

Feedly:SANS Internet Storm Center, InfoCON: green. Assessing Remote Certificates with Powershell, (Mon, Jan 25th)



from SANS Internet Storm Center, InfoCON: green

Building on our last conversation about HTTPS and Powershell, lets look at another common thing y ...(more)...

Feedly:SANS Internet Storm Center, InfoCON: green. ISC Stormcast For Monday, January 25th 2016 http://ift.tt/1ZXyAfD, (Mon, Jan 25th)



from SANS Internet Storm Center, InfoCON: green

...(more)...

Feedly:We Live Security » Languages » English. Skype finally hides your IP address, to protect against vengeful gamers



from We Live Security » Languages » English

For too long streaming video gamers have suffered denial-of-service attacks and raids from police SWAT teams, often assisted by Skype leaking private IP addresses.

The post Skype finally hides your IP address, to protect against vengeful gamers appeared first on We Live Security.

Feedly:SANS Internet Storm Center, InfoCON: green. Obfuscated MIME Files, (Sun, Jan 24th)



from SANS Internet Storm Center, InfoCON: green

As could be expected, the race to obfuscate MS Office documents stored as MIME files to bypass de ...(more)...

Friday, January 22, 2016

Feedly:Threats RSS Feed - Symantec Corp.. Exp.CVE-2016-0015



from Threats RSS Feed - Symantec Corp.

Risk Level: Very Low. Type: Trojan.

Feedly:IOC Bucket OpenIOC 1.0 Latest Ten. ioc stub by @iocbucket.



from IOC Bucket OpenIOC 1.0 Latest Ten

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

Feedly:IOC Bucket OpenIOC 1.0 Latest Ten. ioc stub by @iocbucket.



from IOC Bucket OpenIOC 1.0 Latest Ten

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

Feedly:Threats RSS Feed - Symantec Corp.. Trojan.Swifi!gen6



from Threats RSS Feed - Symantec Corp.

Risk Level: Very Low. Type: Trojan.

Feedly:Threat Research. 2,500 Problems, Zero Infections: The Power of EX and ETP



from Threat Research

Feedly:Security News - Software vulnerabilities, data leaks, malware, viruses. US toughens background check process after major hack



from Security News - Software vulnerabilities, data leaks, malware, viruses

The US government said Friday it was revamping its background check process for federal employees and contractors with a more secure database, following a major hack disclosed last year.

Feedly:Fortinet Blog. CVE-2015-4400 : Backdoorbot, Network Configuration Leak on a Connected Doorbell



from Fortinet Blog

Summary In March 2015, a Network Configuration Leak vulnerability was disclosed to Ring as part of FortiGuard's Responsible Disclosure process. The vulnerability existed on their first internet-connected doorbell, Doorbot v1.0 but other posts o...

Feedly:. Global mass injection affects thousands of websites worldwide



from

Attackers compromise over 3,500 public servers in possible reconnaissance drive for future attacks.
Twitter Card Style: 
summary

global-mass-infection-header_0.jpg

Contributor: Roberto Sponchioni

read more

Feedly:We Live Security » Languages » English. Retailers ‘capable of tracking shoppers through smartphones’



from We Live Security » Languages » English

More and more retailers are investing technology that allows them to track the movement of shoppers through their smartphone, an expert has revealed.

The post Retailers ‘capable of tracking shoppers through smartphones’ appeared first on We Live Security.

Feedly:Malwarebytes Unpacked. Trojan.DNSChanger circumvents Powershell restrictions



from Malwarebytes Unpacked

We take a close look at the functionality of a new variant of the DNS-changer adware family. Especially the use of encoded scripts as a way to bypass the Powershell execution protection.

Categories:

Tags:

(Read more...)

Feedly:SANS Internet Storm Center, InfoCON: green. Extracting pcap from memory , (Fri, Jan 22nd)



from SANS Internet Storm Center, InfoCON: green

I have talked many times about memory forensics and how useful its. In this diary I am going to t ...(more)...

Feedly:Security News - Software vulnerabilities, data leaks, malware, viruses. Hack attack on a hospital IT system highlights the risk of still running Windows XP



from Security News - Software vulnerabilities, data leaks, malware, viruses

A virus attack on the computer system of one of Melbourne's largest hospital networks is cause for concern because it affected machines running Microsoft's Windows XP, an operating system no longer supported by the software giant.

Feedly:We Live Security » Languages » English. Irish lottery and ticket terminals knocked offline by DDoS attack



from We Live Security » Languages » English

It should have been a great week for the Irish Lottery, with the largest jackpot (12 million euros) for 18 months up for grabs.

However, things didn't run entirely smoothly in the run-up to the Wednesday night draw.

The post Irish lottery and ticket terminals knocked offline by DDoS attack appeared first on We Live Security.

Thursday, January 21, 2016

Feedly:TrendLabs Security Intelligence Blog. Operation Emmental Revisited: Malicious Apps Lock Users Out



from TrendLabs Security Intelligence Blog

Imagine getting a notification from your bank, asking for your cooperation in installing an updated version of their mobile app. After downloading the app, it asks for administrator privileges. The notification you received said it would indeed prompt the question and so you allowed it. You try the app out and it works fine. You were...

Feedly:SANS Internet Storm Center, InfoCON: green. ISC Stormcast For Friday, January 22nd 2016. http://ift.tt/1K0ofrQ, (Fri, Jan 22nd)



from SANS Internet Storm Center, InfoCON: green

...(more)...

Feedly:Threats RSS Feed - Symantec Corp.. Linux.Mokes



from Threats RSS Feed - Symantec Corp.

Risk Level: Very Low. Type: Trojan.

Feedly:SANS Internet Storm Center, InfoCON: green. Scanning for Fortinet ssh backdoor, (Thu, Jan 21st)



from SANS Internet Storm Center, InfoCON: green

On 11 Jan, a Python script was posted on the full-disclosure mailing list that took advantage of ...(more)...

Feedly:Fortinet Blog. Android Spywaller: Firewall-Style Antivirus Blocking



from Fortinet Blog

Malware has been known to use new and innovative ways to evade detection by Antivirus software, a phenomenon AV analysts have often seen with PC malware. Not a lot of examples of the same have been seen employed by mobile malware. A recently discove...

Feedly:Security News - Software vulnerabilities, data leaks, malware, viruses. Defending your computer from cyber-attacks, Sun Tzu style



from Security News - Software vulnerabilities, data leaks, malware, viruses

We want our computers to perform the way we expect. But what if the key to defeating malware is introducing a bit of chaos?

Feedly:We Live Security » Languages » English. Countries remain unprepared for cyberattacks on nuclear facilities



from We Live Security » Languages » English

Nuclear facilities across the world have little or no real security mechanisms in place to deal with cyberattacks, according to new analysis.

The post Countries remain unprepared for cyberattacks on nuclear facilities appeared first on We Live Security.

Feedly:. Scammers impersonate India's Income Tax Department to deliver malware



from

India, USA, UK, and other countries are being targeted with fraudulent "tax deduction" emails containing information-stealing malware.
Twitter Card Style: 
summary

fake-income-tax-india-malware-header.jpg

Contributor: Jeet Morparia

read more

Feedly:Malwarebytes Unpacked. Malwarebytes Raises $50 Million from Fidelity



from Malwarebytes Unpacked

We're very excited to announce that we have closed our second round of funding with a fantastic investment partner, Fidelity. For a startup, choosing an investment partner and making a deal happen is usually a stressful process. But this was as close to a no brainer as possible.

Categories:

Tags:

(Read more...)

Wednesday, January 20, 2016

Feedly:SANS Internet Storm Center, InfoCON: green. ISC StormCast for Thursday, January 21st 2016 http://ift.tt/23fXG8L, (Thu, Jan 21st)



from SANS Internet Storm Center, InfoCON: green

...(more)...

Feedly:Fortinet Blog. Deep Analysis of CVE-2016-0010 - Microsoft Office RTF File Handling Heap Overflow Vulnerability



from Fortinet Blog

Summary On the patch Tuesday of this month, Microsoft patched 3 Office vulnerabilities in MS16-004. The vulnerability CVE-2016-0010 was discovered by myself and Fortinet's threat research team at the FortiGuard Labs. It is a heap overflow v...

Feedly:Malwarebytes Unpacked. Spammers Serve Trump and Movie Survey Mashup



from Malwarebytes Unpacked

Spammers jump on the Trump bandwagon...

Categories:

Tags:

(Read more...)

Feedly:We Live Security » Languages » English. New wave of attacks against Ukrainian power industry



from We Live Security » Languages » English

The cyberattacks against the Ukrainian electric power industry continue. Background information on this story can be found in our recent publications: BlackEnergy trojan strikes again: Attacks Ukrainian electric power industry BlackEnergy by the SSHBearDoor: attacks against Ukrainian news media and electric industry BlackEnergy and the Ukrainian power outage: What we really know Yesterday we discovered

The post New wave of attacks against Ukrainian power industry appeared first on We Live Security.

Feedly:Darknet – The Darkside. 123456 Still The Most Common Password For 2015



from Darknet – The Darkside

Feedly:Fortinet Blog. SSH Issue Update



from Fortinet Blog

Fortinet was founded with the goals of providing the best performing security devices on the planet in combination with unmatched value and features.  We take our technology and product quality seriously, and, with that in mind, we want to make...

Feedly:. Indian, US, UK finance department employees targeted with remote access Trojans



from

Financially motivated attackers are sending social-engineering emails to SMBs in India, the UK, and US in order to deliver Backdoor.Breut and Trojan.Nancrat.
Twitter Card Style: 
summary

india-us-uk-rat-header.jpg

read more

Feedly:Malwarebytes Unpacked. Tech Support Scammers Lure Users With Fake Norton Warnings, Turn Out To Be Symantec Reseller



from Malwarebytes Unpacked

Pushing the envelope one step too far, tech support scammers get caught.

Categories:

Tags:

(Read more...)

Feedly:We Live Security » Languages » English. Phony web traffic to cost advertisers $7.2 billion in 2016



from We Live Security » Languages » English

Fraudsters are set to hit online advertisers hard this year, costing them $7.2 billion globally as a result of phony web traffic generated by bots, new research has found.

The post Phony web traffic to cost advertisers $7.2 billion in 2016 appeared first on We Live Security.

Feedly:Virus alerts. Trojan for Android preinstalled on Phillips s307 firmware



from Virus alerts

January 20, 2016

Android.Cooee.1 was found on several unpopular and inexpensive Android devices in October 2015. A new case of Android firmware being infected with this malicious application proves that cybercriminals’ activity is gradually expanding as this malware was detected on Philips s307. Doctor Web specialists informed the producer about this incident. At the moment, Philips is considering possible solutions to the problem.

Android.Cooee.1 is a malicious launcher (Android graphical shell) that, apart from its standard functions, displays annoying advertisements and downloads and installs different software. In particular, Android.Cooee.1 is capable of displaying advertisements in the status bar, in full screen, or on top of running applications. It also can show video advertisements and animation on the home screen. It should be noted that the Trojan starts performing its malicious activities not right after the first running of the system but some time later. As a result, the true source of annoying notifications stays unnoticed because an owner of an infected device believes that advertisements are shown by applications that were installed during device usage.

#drweb   #drweb
#drweb   #drweb

Considering that Android.Cooee.1 is, in fact, a system program, software downloaded by this malware is installed without user knowledge. At that, the range of the downloaded applications is extremely wide: from benign games and web browsers to various malicious programs, such as SMS and downloader Trojans, and even banking Trojans that are able to covertly steal money from users’ bank accounts.

#drweb   #drweb

As Android.Cooee.1 is incorporated into the firmware, you cannot get rid of the Trojan by restoring default settings of the device. One of the possible solutions is to gain root privileges. However, even if such privileges are successfully gained, removal of Android.Cooee.1 will render the device “dead”. The fact is that the launcher program, that contains the Trojan, is responsible for the normal system loading. That is why, before removing the malicious application, it is necessary to install an alternative launcher and set it as default. Moreover, if you gain root privileges, your official manufacturer’s warranty becomes invalid. Besides, there is a high risk of making the device non-operational if its firmware or system files are treated by an inexperienced user. Therefore, the safest solution for victims of Android.Cooee.1 is to contact the manufacturer of the device and ask them to release a firmware update without the Trojan.

Obviously, if you want to safe your device, it is not enough to download applications only from trusted sources. Virus makers more and more often preinstall malware directly on Android devices that you can buy on the Internet or in a store. Thus, Doctor Web security researchers strongly recommend Android users to install a reliable anti-virus software that not only prevents penetration of malware and unwanted applications, but also detects Trojans in firmware.

Protect your Android device with Dr.Web now

Buy online Buy via Google Play Free of charge

Web Analytics