IT threat evolution in Q1 2016
...business to develop further. However, at the beginning of 2016 new Hacking Team implants for OSX were found. This indicates that the group has no intention of halting its work... more…Attack on Zygote: a new twist in the evolution of mobile threats
...products The owners of the Trojans described above, such as Leech, Ztorg, Gorpo (as well as the new malware family Trojan.AndroidOS.Iop) are working together. Devices infected by these malicious programs... more…Windows 10: What’s New in the Security System
...Operating system security is one of Microsoft’s priorities. The developers of the new generation of Windows have vigorously responded to the most significant and relevant threats that target... more…A New Standard for Security at New Standard Corporation
...From the latches on the toolbox in your garage to componentry in gigantic earth movers, New Standard Corporation provides Original Equipment Manufacturer components, assemblies, and related services for... more…A New McAfee, A New Posture: Staying Agile While Still Going Big
...Our culture has an edge to it. We’re not afraid to try new things. As of right now, we’re “the new McAfee” too. Put all of that together and... more…Mobile malware evolution 2015
...The year in figures In 2015, Kaspersky Lab detected the following: 2,961,727 malicious installation packages 884,774 new malicious mobile programs – a threefold increase from the previous year... more…New WannaCry-Mimicking SLocker Abuses QQ Services
...encrypts files Despite appearing more advanced with its new additional routines, this variant actually uses a less sophisticated encryption process. While its predecessor used HTTP, TOR or XMPP to communicate... more…PlugX: New Tool For a Not So New Campaign
...Malware Blog – by Trend Micro PlugX: New Tool For a Not So New Campaign Read more: PlugX: New Tool For a Not So New Campaign Incoming search terms Xvibos... more…CVE-2015-2545: overview of current threats
...xor operations and passes the execution to the result buffer. “update.dat”, a backdoor: Makes its first GET request to hardcoded CnC “newsupdate.dynssl.com/index.html” in order to get the new CnC in... more…New(ish) Mirai Spreader Poses New Risks
...new. The Windows bot’s spreading method for Mirai is very limited as well – it only delivers the Mirai bots to a Linux host from a Windows host if it... more…The Evolution of Acecard
...communicate with the C&C. A month later, we detected a new modification, Backdoor.AndroidOS.Torec. Unlike previous versions, it did not use TOR and targeted credit card details: the Trojan overlaid the... more…You Can Remove This New Ransomware By Playing An Old Video Game
...legally licensed through the NewsCred publisher network. Please direct all licensing questions to legal@newscred.com. The post You Can Remove This New Ransomware By Playing An Old Video Game appeared first... more…Preventing the Next Petya: Block New Exploits by Defending Old Vulnerabilities
...already had six vulnerability-based signatures that allowed it to detect and prevent Petya the day it was released as well as any new attack that tries to exploit the same... more…TeamXRat: Brazilian cybercrime meets ransomware
...here (most of the victims are from Brazil). The new version of Xpan Ransomware shows that the cybercriminals behind it have improved the code to make it more complex, also... more…New Gadget + the Internet = New Threat
...threats appear in unexpected places. I find this forecast valid. Recent history has showed to us that the infrastructure used for new Internet-enabled devices can be accessed by third parties.... more…The return of HackingTeam with new implants for OS X
...from then on. Kaspersky Lab detects the above-mentioned Backdoor implants as Backdoor.OSX.Morcut.u and its dropper as Trojan-Dropper.OSX.Morcut.d Read more: The return of HackingTeam with new implants for OS X... more…Kam dál?
- Update: Secure Certificates slow
- Report: FBI can’t access Silk Road owner’s $80 million in Bitcoins
- Iran oil terminal suffers malware attack
- How to Gain a Competitive Advantage with an Integrated Approach to Security
- 6 Enterprise Solutions for Successful Identity Management
- NVIDIA Patches Several Flaws in GPU Display Drivers
- Resolved: Penn State Beaver
- Researchers find chinks in the armour of satellite phone calls
- New untraceable messaging system comes with statistical guarantees
- Changes to ANGEL Login for Finals Week