RSA Conference 2014: The Way Forward
I attended the RSA 2014 Conference in San Francisco, which has held about two weeks ago. This year the conference offered new insights to today’s threat landscape, which will help us all plan for and protect users in 2014 and beyond. Largest Security Conference of 2014 The attendance numbers for RSA are always impressive: this […] more…SINOWAL Attempts To Disable Rapport, Aid ZBOT
The year might be coming to a close but we’re still seeing our 2013 predictions come true. We encountered an attack that featured an old malware with new routines. This malware, detected as BKDR_SINOWAL.COP specifically attempts to disable the Rapport software from Trusteer. Figure 1. Code that looks for the Trusteer Rapport module Rapport is software […] more…Twitter Drama and What Parents Need to Know
With more teens flocking to social networks outside of Facebook, it’s more important than ever for parents to understand—and coach their kids—through the rapid-moving, drama-filled environment of Twitter. Twitter has become a hot spot for teens, many of whom view Tweets the same way they view texts. They tweet quickly and often. And, sometimes things […] more…Shady Surfing: Online Ads 182x More Likely than Adult Websites to Infect Your PC
Wait…what! You heard it right: According to a recent security report, Internet users are 182 times more likely to get a virus from clicking on online ads than visiting an adult website. At first glance, this sounds extremely counterintuitive (and it is). In theory, wouldn’t your risk go up when visiting shady sites? Yes and […] more…Observations on the Evolution of Cyber Tactics in 2013
“There is one thing stronger than all the armies in the world, and that is an idea whose time has come.” – Victor Hugo The world has reached a point of inflection in cybercrime. As cyberspace abounds with cyber privateers, and many nations of the world become havens for these modern-day pirates, it appears that […] more…Facebook Spam Leverages, Abuses Instagram App
The downside of popularity is that cybercriminals tend to abuse it for their own nefarious ends. Case in point, social networking sites have been often used to proliferate malware. Just recently, we spotted a Facebook clickjacking attack that leverages and abuses Instagram to point users to malicious websites. Users encounter this threat by being tagged […] more…Beware, the Curious Case of iPhone Spyware
The new iPhone spy app launched officially by the Apple Store ought to be turning quite a few heads at this point. The name of the app is enough to stop everyone in their tracks. ‘Stalker’ is now available for download and only costing a meager 99 cents, there is no reason that anyone should not be one. […] more…More information
- DoD Taps DEF CON Hacker Traits For Cybersecurity Training Program
- Critical Vulnerabilities Found in AUVESY Product Used by Major Industrial Firms
- Dark Web marketplace “Nucleus” vanishes – and no one knows why
- WikiLeaks chief Assange unlikely to surrender to police
- On NSA Hijacking of IRC Bots
- Accenture to Acquire Symantec’s Security Services Unit from Broadcom
- First iPhone X batch reportedly only contains 46,500 units
- Philippine Military Ordered to Stop Using Artificial Intelligence Apps Due to Security Risks
- Unhappy 39th birthday, spam, and many unhappy returns
- More than 50,000 Lenovo PCs recalled on fire risk