Latest Posts | Page 136

You ran all the scans, conducted all the tests and yep…you've got malware Last month, we detailed steps you could take in those critical and panic-filled moments when you realized that you might have clicked on a malicious link or opened an infected attachment, but weren’t quite sure you’d been infected. Now, in a follow-up, we'll note a few actions you can take in the event that malware was indeed installed on your computer. First, nothing substitutes for the expertise of an IT professional for an accurate assessment of your computer’s... [Read More]
by RSS Stefanie Hoffman  |  May 02, 2012  |  Filed in: Industry Trends
No doubt, the recent groundswell of legislation around cybercrime and cyber security has served to raise public awareness and could potentially spur security sales as the issue remains on the forefront of political and social debate. But with the barrage of newly introduced cybersecurity legislation, it’s easy to get lost in the melee of political, technical and legislative jargon, not to mention a sea of vaguely understood acronyms. Here is a bit of a guide that might make the path through this jungle a tad easier. ** Cyber Intelligence Sharing... [Read More]
by RSS Stefanie Hoffman  |  May 01, 2012  |  Filed in: Industry Trends
Infections and exploits plagued this week in security, affecting everything from the Mac OS X to Oracle database servers. High profile leaks and a passage of a controversial information sharing bill also graced the security landscape. Here's a look at April 23-27. VMware Source Code Leaked: Last week, VMware confirmed an attack that led to the online publication of source code for its ESX hypervisor and said that more could be on the way. The individual stepping up to take credit for the attack was a hacker going by the handle of Hardcore Charlie,... [Read More]
by RSS Stefanie Hoffman  |  Apr 30, 2012  |  Filed in: Industry Trends
It seems that lately, threats that were once were simply known as “malware” or “viruses” have been elevated to the status of Advanced Persistent Threat (APT), a term that has strategically been used to strike fear in the hearts of consumers. These days, APTs have a much more common presence in the media, and some of the most notorious have included major global threats such as Ghostnet (a botnet deployed in various offices and embassies to monitor the Dalai Lama agenda), Shady RAT (like Ghostnet but with government and global corporate... [Read More]
by RSS Stefanie Hoffman  |  Apr 25, 2012  |  Filed in: Industry Trends
In April's Security Minute, Derek Manky discusses new Tigerbot Android Malware, 2Pac Shakur-related Web links, and interesting new developments in Ransomware code. [Read More]
by RSS Rick Popko  |  Apr 24, 2012  |  Filed in: Industry Trends
Among other things, Anonymous was up to its usual shenanigans, a new Android attack that emerged already tainted a brand new photo app and Apple malware continued to baffle inexperienced Mac users naive to the ways of security threats. Here's a look at the security landscape for April 16-20. Surprise! Another Mac Threat: Last week, yet another Mac Trojan was found on the security threatscape wreaking havoc on the once typically sheltered Mac OS X users. Specifically, the new Mac Trojan, dubbed Backdoor OSX SabPub.a, exploits a Java vulnerability... [Read More]
by RSS Stefanie Hoffman  |  Apr 23, 2012  |  Filed in: Industry Trends
For the most part, we all know what NOT to do when it comes to security best practices. We all know not to click on unsolicited links embedded in e-mail or IM. We all know not to open any strange attachments or respond to suspicious or unfamiliar e-mails. And most people know that many--but certainly not all--of those surveys trolling around Facebook will probably send a viral worm or some kind of infection to everyone on your contact list. But what happens if—in a moment of weakness—we unintentionally do click on a link -- despite all of our... [Read More]
by RSS Stefanie Hoffman  |  Apr 20, 2012  |  Filed in: Industry Trends
Mobile botnet Android/RootSmart (aka Bmaster) is making substantial amount of money from premium SMS numbers or services, according to Cathal Mullaney's discovery of a mobile botnet front-end: yes, we had told you so. Glance at Guillaume Lovet's paper at Virus Bulletin back in 2006, where he explains the business behind mobile botnets. His illustration is exactly what Android/RootSmart (aka Bmaster) does: Later, at SAR SSI in 2010, I re-insisted on the potential impact of such strategies: It's interesting to notice my estimate of... [Read More]
by RSS Axelle Apvrille  |  Apr 20, 2012  |  Filed in: Security Research
Slowly but surely, Application Control is changing the way most people think about traditional security policies. And in this day and age, it's becoming a mainstay in a comprehensive security-driven environment. The reason? Major security threats have evolved, says Jason Clark, Fortinet security evangelist. But the way users consume information and access the Internet has evolved too. Instead of consuming static content such as a hardbound encyclopedia, users consistently now access dynamic content such as Wikipedia - a development not lost on... [Read More]
by RSS Stefanie Hoffman  |  Apr 19, 2012  |  Filed in: Industry Trends
Mac lovers, hold onto your machines—it's going to be a bumpy ride after yet another Mac Trojan was found on the security threatscape, once again wreaking havoc on the once typically sheltered Mac OS X users. Moscow-based antivirus firm Kaspersky Lab warned users in a blog post that the new Mac threat, dubbed Backdoor OSX SabPub.a, is another Trojan exploiting a Java vulnerability known as Exploitl.Java, which seems to have developed a talent for circumventing antimalware scanners and is likely used in Mac APT attacks. The latest,... [Read More]
by RSS Stefanie Hoffman  |  Apr 17, 2012  |  Filed in: Industry Trends