Create RSS Widget

NEWS / COMPUTERS / SOFTWARE / MALWARE

Samsung Galaxy S4 Vulnerable to Malware

NewsFactor Network: A Ph.D student in Israel says adding an innocuous app to the non-secure area of Samsung's Knox architecture can lead to malware compromising the secure area due to the security breach. Samsung's Knox is a state-of-the-art, secure mobile architecture, ...
Backoff Malware Is Spreading in Retail Systems

- 5 days ago @ newsfactor.com: In particular, infections of the Backoff malware blamed for high-profile breaches at Target, Dairy Queen, Home Depot and Kmart rose by 57 percent between August and September, according to Damballa, while attacks in September alone rose by 27 percent.

Tor users advised to check their computers for malware

- 2 days ago @ theguardian.com: Users of internet anonymiser Tor are being advised to secure their connections and check their computers for malware, after a security researcher discovered that the service was being used to inject potentially malicious code into downloads over the ...

BlackEnergy malware has compromised industrial control systems for two years

- 1 day ago @ ri.search.yahoo.com: Sophisticated and ongoing, warns US-CERT

Malware warning, Microsoft security and the Army's G-6 handoff

- 14 hours ago @ ri.search.yahoo.com: News and notes from around the federal IT community.

Russia
Ebola
Fbi
Queen
Seattle

LATEST NEWS

Beware of the malware walking dead

SC Magazine: Like their undead human counterparts, they aren't always nimble, but these malware zombies can be just as dangerous. Take data destruction attacks, for example: prior to 2003, data destruction attacks were the norm with malware. Viruses were primarily ...

Next-generation malware: Think like the enemy and avoid the car alarm problem

SC Magazine: Next-generation malware attacks are VM evasive, can come via social engineering or physical delivery (a USB drive), and be targeted to a specific folder, or application, that a business is known to use regularly. Some attacks have the ability to hide ...

Malware warning, Microsoft security and the Army's G-6 handoff

FCW.com: Malware similar to that used in a cyber intrusion campaign that infiltrated computer facilities at a U.S. academic institution, Western European governments and energy and telecommunications companies is behind a three-year long campaign to probe U.S. ...

Malware warning, Microsoft security and the Army's G-6 handoff

News and notes from around the federal IT community.

Changing the Way We Fight Malware

PC Magazine: This data could help antivirus companies and academic researchers develop better ways to fight malware. In a keynote speech for the 9th IEEE International Conference on Malicious and Unwanted Software (Malware 2014 for short), Microsoft's Dennis ...

Computers Could Talk Themselves into Giving Up Secrets

Malware might use a voice synthesizer to bypass some security controllers, researchers say. Voice-control features designed to make PCs and smartphones easier to use, especially for people with disabilities, may also provide ways for hackers to bypass security protections and access the data stored on those devices.

Hackers using Gmail drafts to steal data and update malware

ITProPortal: Hackers have cottoned on to the privacy benefits of the Gmail drafts folder, a study by security startup Shape Security suggests (as reported by Wired). A certain type of malware was identified on a client's network. Hidden away in innocent-looking ...

Malware is less concerned about virtual machines

Many malicious software programs used to make a quick exit on virtual machines, a tactic designed to avoid a security check. But that isn't the case anymore, according Symantec research. As companies increasingly use VMs in operational environments, malware writers are largely trying other methods to avoid detection. It means that simply running VMs won't be enough to scare away malware ...

RELATED PAGES:


LATEST NEWS ABOUT SOFTWARE:

Windows Blue

3

Windows 8

4

Malware

5

Adobe Photoshop

6

TIED TO CHINA..

Security vendor coalition cleans 43K malware infections used for cyberespionage

Computerworld: A coalition of security vendors has disrupted the activities of a sophisticated group of attackers tied to China that, over the past six years, infiltrated the computers of many Fortune 500 companies, journalists, environmental groups, software ...

Security vendor coalition cleans 43000 malware infections used for

ITworld.com: A coalition of security vendors has disrupted the activities of a sophisticated group of attackers tied to China that, over the past six years, infiltrated the computers of many Fortune 500 companies, journalists, environmental groups, software ...

Security vendor coalition cleans 43000 malware infections used for

PCWorld: A coalition of security vendors has disrupted the activities of a sophisticated group of attackers tied to China that, over the past six years, infiltrated the computers of many Fortune 500 companies, journalists, environmental groups, software ...

Security vendor coalition cleans 43, 000 malware infections used for cyberespionage

A coalition of security vendors has disrupted the activities of a sophisticated group of attackers tied to China that, over the past six years, infiltrated the computers of many Fortune 500 companies, journalists, environmental groups, software companies, academic institutions, pro-democracy groups and government agencies around the world. The so-called “interdiction” effort was publicly ...

AFTER A SECURITY RESEARCHER..

Tor users advised to check their computers for malware

The Guardian: Users of internet anonymiser Tor are being advised to secure their connections and check their computers for malware, after a security researcher discovered that the service was being used to inject potentially malicious code into downloads over the ...

Tor Project flags Russian 'exit node' server for delivering malware

PCWorld: The Tor Project has flagged a server in Russia after a security researcher found it slipped in malware when users were downloading files. Tor is short for The Onion Router, which is software that offers users a greater degree of privacy when browsing ...

Tor users advised to check their computers for malware

Users of the anonymising service may have accidentally downloaded malware thanks to a malicious Russian hacker Users of internet anonymiser Tor are being advised to secure their connections and check their computers for malware, after a security researcher discovered that the service was being used to inject potentially malicious code into downloads over the service. Tor allows users to surf the ...

POINT OF SALE..

Trying to Avoid Backoff Malware? Good Luck

PC Magazine: Target and Home Depot are two of the larger Backoff-related breaches of late, but Dairy Queen, Kmart, Jimmy John's, P.F. Chang's, and Goodwill are also among the 1,000 businesses infected last quarter by the point of sale (PoS) malware. Unfortunately ...

BACKOFF MALWARE..

Research Suggests Backoff Malware Still Widely Infecting POS Systems

eWeek: Backoff first came to light in July, when the U.S. Computer Emergency Readiness Team warned retailers that cyber-criminals were widely deploying the malware. The number of companies affected by the malware has risen over 1,000, according to the U.S. ...

Backoff Malware Is Spreading in Retail Systems

NewsFactor Network: In particular, infections of the Backoff malware blamed for high-profile breaches at Target, Dairy Queen, Home Depot and Kmart rose by 57 percent between August and September, according to Damballa, while attacks in September alone rose by 27 percent.

Backoff Malware Is Spreading in Retail Systems

CIO Today: With enterprises now averaging more than three dozen infected IT devices daily and attacks by point-of-sale (POS) malware like Backoff rising by double digits, companies today need to "operate under the assumption they are in a state of continuous breach.

EXIT NODE..

Rogue Tor node wraps executables with malware

ZDNet: Josh Pitts of Leviathan Security Group has uncovered a malicious Tor exit node in Russia. The node wraps Windows executable files inside a second, malicious Windows executable. The wrapping is only attempted on uncompressed Windows PE (Portable ...

Rogue Tor exit node caught sneaking malware into users' downloads

Geek: Some Tor users who were downloading files from the Deep Web may have gotten a nasty surprise recently. A rogue exit node was discovered that was patching malicious code onto binary downloads. These weren't necessarily files downloaded from shady ...

Researchers Finds Malicious Tor Exit Node Adding Malware to

A security researcher has identified a Tor exit node that was actively patching binaries users download, adding malware to the files dynamically. The discovery, experts say, highlights the danger of trusting files downloaded ...

SECURITY..

Hackers Are Using Gmail Drafts to Update Their Malware and Steal Data

Wired: Researchers at the security startup Shape Security say they've found a strain of malware on a client's network that uses that new, furtive form of “command and control”—the communications channel that connects hackers to their malicious software ...

Malware attacks on Android users up 600% - Kaspersky

GMA News: According to the recent Mobile CyberThreats survey, 60% of attacks registered by Kaspersky Lab security products used malware that specifically targeted financial information on Android users' devices. The survey was conducted by INTERPOL ...

Backoff PoS Malware Boomed In Q3

Dark Reading: According to a new report from the security firm Damballa, detections of the notorious point-of-sale (PoS) malware jumped 57% from August to September. During the month of September alone, Backoff infections increased 27%. This year, the Secret Service ...

Scary new malware uses a Gmail trick to steal your data

A new piece of malware that can spy on a user’s computer has been discovered, Wired reports, with researchers also having found a clever way for the program to communicate with its creators: Google’s popular Gmail email service. FROM EARLIER: You can force your way into Google’s Inbox even without an invite Security startup Shape Security says it found a new strain of malware that’s able to read ...

Russia's shadowy 'APT28' hackers targeting pro-Western governments since 2007

A Russian state-backed hacking group dubbed ‘APT28’ has for the last decade systematically targeted NATO and a raft of East European and Caucasus governments with espionage malware, research by security firm FireEye has confirmed.

GLOBAL TRENDING TOPICS

BURKINA FASO
NEW ORLEANS SAINTS
NBA
CHICAGO BULLS
CLEVELAND CAVALIERS
TIM COOK
RSSPump.com Content Aggregation Service 2013 - Powered By: RSSPump RSS Widgets