Tag Archives for " malware "

BlackTech threat group steals D-Link certificates to spread backdoor malware

Researchers have uncovered a new malicious campaign which utilizes stolen D-Link certificates to sign malware. The same certificate was used to sign legitimate D-Link software. Malware includes a backdoor component and the exfiltration tool.

Source: BlackTech threat group steals D-Link certificates to spread backdoor malware – TechRepublic

Data indicates human error prevailing cause of breaches, incidents

Ransomware. Malware. Phishing. Given the types of high profile cyberthreats that carry the most coverage in the news, there is a tendency to assume incidents exposing sensitive, regulated data occur as a result of an organization being “under attack.” Seasoned privacy professionals, however, know that in reality, the majority of incidents are inadvertent and unintentional, and can be classified as human error. And these incidents still trigger the same regulatory obligations as intentional and malicious incidents.

Read full article: Data indicates human error prevailing cause of breaches, incidents

Hackers infect 500,000 consumer routers all over the world with malware

Hackers have infected more than 500,000 home and small-office routers around the world with malware that can be used to collect communications, launch attacks on others, and permanently destroy the devices with a single command.

Source: Hackers infect 500,000 consumer routers all over the world with malware | Ars Technica

Chinese government is behind a decade of hacks on software companies

Researchers said Chinese intelligence officers are behind almost a decade’s worth of network intrusions that use advanced malware to penetrate software and gaming companies in the US, Europe, Russia, and elsewhere.

The hackers have struck as recently as March in a campaign that used phishing emails in an attempt to access corporate-sensitive Office 365 and Gmail accounts. In the process, they made serious operational security errors that revealed key information about their targets and possible location.

Source: Report: Chinese government is behind a decade of hacks on software companies | Ars Technica

Sophisticated Android malware tracks all your phone activities

An advanced type of malware can spy on nearly every Android smartphone function and steal passwords, photos, video, screenshots and data from WhatsApp, Telegram and other apps. “ZooPark” targets subjects in the Middle East and was likely developed by a state actor, according to Kaspersky Lab, which first spotted and identified it.

Source: Sophisticated Android malware tracks all your phone activities

Cloud computing highlights new security challenges in hybrid IT

During the recent Tech Field Day 16 event, Forcepoint teased the beginning of what I believe is a much-needed shift in hybrid IT security. At the VMware-sponsored FutureNet conference, a Verizon spokesman shared the fundamental challenge with hybrid IT security: There isn’t a consistent construct on which to build a security enforcement plan across the public and private cloud.

The traditional approach to enterprise security relies on network access control (NAC). NAC has proven a crutch for enterprise security for years, as security professionals could loosely base identity on the node where traffic originates.

Source: Serverless computing highlights new security challenges in hybrid IT – TechRepublic

Ditch The False Sense Of Security And Take Charge Of Your Online Privacy

On Consumer Rights Day, we’re reminded that the digital marketplace is where scams, fraud and identity theft to flourish.

According to a recent survey put out by TD Canada Trust, nearly three-quarters of Canadian millennials say they feel at risk of becoming a victim of cybercrime — and they should be.

Source: Ditch The False Sense Of Security And Take Charge Of Your Online Privacy

The Best Spyware Protection Security Software of 2018

Is someone peeking at you secretly through your laptop’s webcam? Or logging all the keys you type, including your passwords? Malware coders find all kinds of ways to spy on you—it’s creepy.

If you have antivirus protection installed, it should eliminate spyware, just as it wipes out other types of malware. But some security tools add layers of protection that actively protects against various types of spying malware. This article doesn’t focus on the best antivirus products. Instead, I’ve selected products that exemplify seven active defenses against spyware, including protection from webcam peepers and keystroke loggers.

Source: The Best Spyware Protection Security Software of 2018 | PCMag.com

Malicious botnets responsible for 40% of global login attempts

In the fourth quarter of 2017, a spike in the use of botnets for credential abuse was noted as 7.3 trillion bot requests were analysed.

Remote code execution vulnerabilities particularly in enterprise-level software have also proved a favourable target for attackers recently, looking to enslave the systems as part of botnets.

Source: Malicious botnets responsible for 40% of global login attempts

How Tech is Failing Victims of Intimate Partner Violence

What technology risks are faced by people who experience intimate partner violence? How is the security community failing them, and what questions might we need to ask to make progress on social and technical interventions?

Intimate partner violence (IPV) is a huge problem, says Thomas Ristenpart, an associate professor at Cornell Tech and a member of the Department of Computer Science at Cornell University. 25% of women and 11% of men will experience rape, physical violence, and/or stalking by an intimate partner, according to the National Intimate Partner and Sexual Violence Survey. To put this question in context for tech companies, this means that 360 million Facebook users and 252 million Android users will experience this kind of violence.

Source: How Tech is Failing Victims of Intimate Partner Violence: Thomas Ristenpart at CITP

1 2 3
>