Mirrorthief Group Uses Magecart Skimming Attack to Hit Hundreds of Campus Online Stores in US and Canada
We uncovered a recent activity involving the notorious online credit card skimming attack known as Magecart. The attack, facilitated by a new cybercrime group, impacted 201 online campus stores in the United States and Canada. We started detecting the attacks against multiple campus store websites on April 14, during which the sites were injected with […] more…4 Reasons to Visit Costa Rica
Costa Rica has become one of the go-to destinations in recent times and it is easy to see why. The year round warm temperatures attract sun seekers, but if too much sun is not for you, the temperatures are often cooled down with refreshing bursts of rain. The busiest time of year for people visiting […] more…Game of Threats
Introduction While the way we consume TV content is rapidly changing, the content itself remains in high demand, and users resort to any means available to get at it – including illegal and non-ethical ones like the use of pirated stuff. The world is embracing the idea of paying for entertainment more and more with […] more…DNS Manipulation in Venezuela in regards to the Humanitarian Aid Campaign
Venezuela is a country facing an uncertain moment in its history. Reports suggests it is in significant need of humanitarian aid. On February 10th, Mr. Juan Guaidó made a public call asking for volunteers to join a new movement called “Voluntarios por Venezuela” (Volunteers for Venezuela). According to the media, it already numbers thousands of […] more…APT review of the year
What were the most interesting developments in terms of APT activity throughout the year and what can we learn from them? Not an easy question to answer; everybody has partial visibility and it’s never possible to really understand the motivations of some attacks or the developments behind them. Still, with the benefit of hindsight, let’s […] more…Family Tech Check: 5 Ways to Help Kids Balance Tech Over Summer Break
It’s mind-blowing to think that when you become a parent, you have just 18 summers with your child before he or she steps out of the mini-van and into adulthood. So at the mid-summer point, it’s a great time to ask: How balanced is your child’s screen time? Don’t panic, it’s normal for screen time […] more…Trojan watch
We continue to research how proliferation of IoT devices affects the daily lives of users and their information security. In our previous study, we touched upon ways of intercepting authentication data using single-board microcomputers. This time, we turned out attention to wearable devices: smartwatches and fitness trackers. Or more precisely, the accelerometers and gyroscopes inside […] more…International Women’s Day in the Channel
I have had the privilege of working with many exceptional people over the course of my career. For International Women’s Day this year, I wanted to feature some of the dedicated and talented women I have the opportunity to work with in the Channel. The following individuals have great advice and stories that we all […] more…The Top 5 Scariest Mobile Threats
Halloween has to be one of my favorite holidays of the year. Creative costumes, buckets of candy, and pumpkin spice lattes make All Hallows’ Eve a memorable event for people of all ages. But what I love most about Halloween is the traditions associated with it: pumpkin carving, trick or treating and bobbing for apples […] more…Dnsmasq: A Reality Check and Remediation Practices
Dnsmasq is the de-facto tool for meeting the DNS/DHCP requirements of small servers and embedded devices. Recently, Google Security researchers identified seven vulnerabilities that can allow a remote attacker to execute code on, leak information from, or crash a device running a Dnsmasq version earlier than 2.78, if configured with certain options. Based on Censys and Shodan data, […] more…Businesses as Ransomware’s Goldmine: How Cerber Encrypts Database Files
Possibly to maximize the earning potential of Cerber’s developers and their affiliates, the ransomware incorporated a routine with heavier impact to businesses: encrypting database files. These repositories of organized data enable businesses to store, retrieve, sort, analyze, and manage pertinent information. When utilized effectively they help maintain the organization’s efficiency, so holding these mission-critical files […] more…CUTWAIL Spambot Leads to UPATRE-DYRE Infection
A new spam attack disguised as invoice message notifications was recently seen spreading the UPATRE malware, that ultimately downloads its final payload- a BANKER malware related to the DYREZA/DYRE banking malware. Background In early October we observed a surge of spammed messages sent by the botnet CUTWAIL/PUSHDO, totaling to more than 18,000 messages seen in a single day. CUTWAIL/PUSHDO has been in […] more…Paying For Content
I remember setting up our first website. That was 20 years ago, in 1994. When the Web was very young and there were only a handful of websites, it was easy to forecast that the Web was going to grow. And indeed, during these past 20 years, it has exploded in size. What’s even more […] more…Spam in May 2014
Spam in the spotlight In the run-up to the summer, spammers offered their potential customers seedlings and seeds for gardening. In addition, English-language festive spam in May was dedicated to Mother’s Day – the attackers sent out adverts offering flowers and candies. Holiday spam for Mom As usual, the spammers were very busy in the […] more…Wearing My Super Hero Cape to Work: McAfee reaches 100,000 Kids through Online Safety for Kids Program
We have a saying here at McAfee, “Safe Never Sleeps”. What this means to us, is that we work around the clock to keep the world safe from the bad guys. What this means to you, is that in this rapidly moving technological world, you have somebody to trust – a team of people to […] more…Mountain Lion’s Gatekeeper: More Control For "You"
Yesterday, Apple released Mac OS X Mountain Lion Developer Preview. From a security perspective, its most interesting new feature is Gatekeeper, which restricts installation of downloaded applications based on their source. “Allow applications downloaded from: Mac App Store; Mac App Store and identified developers; Anywhere” The default setting is reportedly “Mac App Store and identified […] more…More information
- Comcast users phished by Constant Guard spam lure
- Firefox to start blocking ad-tracking by default
- Microsoft Office CVE-2015-2477 Memory Corruption Vulnerability
- 7 Scary Good Tips to Secure Your Website
- Apple: WebKit Bugs Exploited to Hack Older iPhones
- Following Ransomware’s Path to Extortion
- Amnesty International Calls Facebook, Google Rights Abusers
- Tesla’s New Battery Doesn’t Work That Well With Solar
- 10 questions for Ping Identity CTO Patrick Harding
- New Collision Attack Lowers Cost of Breaking SHA1