Apps Tracking Your Location: Friendly or Creepy?
There is no denying the fact that the world has gone wireless. With the explosion of smartphones and the “bring your own device” (BYOD) movement, it is not hard to believe that more than 85% of American adults own a mobile phone and over half of them use them access the Internet. Mobile apps are […] more…10th Anniversary of the Slammer Worm
This is how January 25th started for us, 10 years ago: Jan 25 05:31:54 kernel: UDP Drop: IN=ppp0 SRC=207.61.242.67 DST=80.142.167.238 TTL=117 ID=30328 PROTO=UDP SPT=2201 DPT=1434 LEN=384 The above snippet is the first log we have of what become known as the Slammer worm (or Sapphire or SQL Slammer). Slammer produced tons of network traffic. Here’s […] more…Server Compromises – Understanding Apache Module iFrame Injections and Secure Shell Backdoor
There are many ways to inject a malicious payload onto a website. The attacker can modify any of the web files (index.php for example), the .htaccess file or php.ini (if the site is using PHP). There are other ways, but those are the most common methods, specially on shared hosts. However, for the last year, […] more…Server side iframe injections via Apache Modules and SSHD backdoor
There are many ways to inject a malicious payload on a compromised site. The attacker can modify any of the web files (index.php for example), the .htaccess file or php.ini (if the site is using PHP). There are other ways, but those are the most common methods, specially on shared hosts. However, for the last […] more…Malware Disguised as Java Update: Careful What You Download!
All too often, cyber attacks are crimes of opportunity. This was exactly the case when late last week, hackers created a fake website to fool users into downloading a virus instead of the latest version of Java. As many of you read here in the blog, Oracle recently released a patch for a critical Java […] more…Shylock Not the Lone Threat Targeting Skype
Shylock malware which spreads via Skype is not the only threat that users should be worried about. We found another worm that takes advantage of Skype to spread copies of itself. Reports of Shylock malware found on certain Skype messages was a hot topic last week. We looked into the related samples and based on […] more…Red October – Java Exploit Delivery Vector Analysis
Since the publication of our report, our colleagues from Seculert have discovered and posted a blog about the usage of another delivery vector in the Red October attacks. In addition to Office documents (CVE-2009-3129, CVE-2010-3333, CVE-2012-0158), it appears that the attackers also infiltrated victim network(s) via Java exploitation (MD5: 35f1572eb7759cb7a66ca459c093e8a1 – ‘NewsFinder.jar’), known as the […] more…How to Protect Your Devices from a Fast Spreading Java Virus
Last week, a new security issue surfaced for a popular programming language known as Java. This Java security issue is classified as a zero-day threat, and it spreads malicious files to unprotected computers. A zero-day threat is an attack that exploits a previously unknown vulnerability in a computer application (in this case Java), which means that the attack […] more…What’s on Your Phone? A Lot More than You Realize.
It’s funny to me that when having conversations about technology people still don’t see the parallel between their smartphone and their computer. Today, smartphone are connected to the Internet and have much of the same information as the personal computer, if not more. Now Androids and other smartphones have become little mini handheld computers. Carriers […] more…Kick Off 2013 with Online Privacy in Mind
Back in August, a Forbes article pointed out 10 simple ways to protect your privacy. The full list included: Password protecting devices Putting a Google Alert on your name Signing out of email and social networks when done Being wary of giving out your personal information Encrypting your computer Turning on 2-Step authentication in Gmail […] more…Why is the Watering Hole Technique Effective?
Late last week, the Council of Foreign Relations website was compromised and modified to host a 0-day exploit affecting Internet Explorer. Analysis revealed that the attack was set to affect a specific set of users, as it was set to work only if the browser language was set to English (US), Chinese (China), Chinese (Taiwan), […] more…McAfee’s 2013 Consumer Threat Predictions
Here’s a sneak peek at the threats that could affect devices in the year ahead — Cybercrime is constantly evolving as cybercriminals look for new avenues of attack, and fresh angles on old tricks that have worked in the past. That’s why McAfee Labs™ is always on the lookout for new threats, performing in-depth research, […] more…What Can We Expect in 2013?
The cybercrime landscape is always growing and changing as hackers look for new ways to make money from us. And 2012 was no different as McAfee Labs™ found huge growth in malicious software and activities. As the year closes, McAfee Labs looks ahead to see what is on the horizon for 2013. Here’s the areas […] more…A Look Back: Top 5 Security Trends of 2012
As we look back on 2012, it’s impossible not to recall the many high-profile breaches and cybersecurity incidents that took place this year. 2012 has certainly been a rocky one for online safety and consumer security as a whole, with numerous high-traffic websites breached and more malware and mobile threats than ever before. While it’s […] more…Recent Consumer Threat Wrap-up – What Merchants Should Know
As we say goodbye to this year and usher in the next, it’s important to look back on some recent events that occurred with respect to consumer security. Businesses have a responsibility to keep personal and financial data safe, and part of that comes from staying informed on the latest cyber perils your customers are […] more…Top 5 Consumer Threats for 2012
The beginning of 2013 is just around the corner, which means we must prepare for a fresh start. But before we prep for the new year, we must first look back at the biggest threats of 2012 – to learn from them and arm ourselves with a new, more security-conscious mindset. Blackhole Exploit Kit spam […] more…More information
- The return of Fantomas, or how we deciphered Cryakl
- New Malicious PyPI Packages used by Lazarus
- Cryptolocker: How to avoid getting infected and what to do if you are
- Fidelis Adds Risk Simulation and MITRE ATT&CK Mapping to Elevate Platform
- Online advertising poses significant security, privacy risks to users, US Senate report says
- Enlisting Employees to Fight Cyber Threats
- Android malware in pictures – a blow-by-blow account of mobile scareware
- Could Apple Card finally become an international service?
- Hundreds of Tesla Powerwall Gateways Potentially Exposed to Hacker Attacks
- Microsoft Internet Explorer ‘CDwnBindInfo’ Use-After-Free Remote Code Execution Vulnerability