Game of Threats
Introduction While the way we consume TV content is rapidly changing, the content itself remains in high demand, and users resort to any means available to get at it – including illegal and non-ethical ones like the use of pirated stuff. The world is embracing the idea of paying for entertainment more and more with […] more…What are the Pros and Cons of Snooping on Your Kids Online?
I’ve changed my mind on the snooping question quite a bit since I began writing about family safety over five years ago. I’ve had to. Technology has dramatically changed all of us in that short time. Still, at least once a month a parent asks me, “How much should I really be snooping on my […] more…EyePyramid and a Lesson on the Perils of Attribution
In the past weeks, information-stealing malware EyePyramid made headlines after it was used to steal 87GB of sensitive data from government offices, private companies and public organizations. More than 100 email domains and 18,000 email accounts were targeted, including those of high-profile victims in Italy, the U.S., Japan and Europe. The natural assumption for many […] more…App Store Flooded with Phony Retail Apps to Kick Off Holiday Season
The holiday season has officially kicked off, which means a number of things for many of us: seasonal cheer, quality time with loved ones, and admittedly for many, lots and lots of shopping. And these days, many of holiday retail sales are happening online. Unfortunately, that also means now more than ever, there’s more holiday-related […] more…Can Internet of Things be the New Frontier for Cyber Extortion?
The Internet of Things (IoT)—the network of devices embedded with capabilities to collect and exchange information—has long been attracting the attention of cybercriminals as it continues to gain momentum in terms of its adoption. Gartner has estimated that more than 20.8 billion IoT devices will be in use by 2020; IoT will be leveraged by […] more…Georgia man sentenced to nine years for stolen credit card data
A 28-year-old man was sentenced to more than nine years in prison Wednesday for buying stolen credit and debit card numbers from an underground online marketplace. Cameron Harrison of Augusta, Georgia, pleaded guilty in April to participating in a racketeer-influenced corrupt organization and trafficking in false identification documents. He was also ordered to pay $50.8 […] more…SINOWAL Attempts To Disable Rapport, Aid ZBOT
The year might be coming to a close but we’re still seeing our 2013 predictions come true. We encountered an attack that featured an old malware with new routines. This malware, detected as BKDR_SINOWAL.COP specifically attempts to disable the Rapport software from Trusteer. Figure 1. Code that looks for the Trusteer Rapport module Rapport is software […] more…Twitter Drama and What Parents Need to Know
With more teens flocking to social networks outside of Facebook, it’s more important than ever for parents to understand—and coach their kids—through the rapid-moving, drama-filled environment of Twitter. Twitter has become a hot spot for teens, many of whom view Tweets the same way they view texts. They tweet quickly and often. And, sometimes things […] more…Shady Surfing: Online Ads 182x More Likely than Adult Websites to Infect Your PC
Wait…what! You heard it right: According to a recent security report, Internet users are 182 times more likely to get a virus from clicking on online ads than visiting an adult website. At first glance, this sounds extremely counterintuitive (and it is). In theory, wouldn’t your risk go up when visiting shady sites? Yes and […] more…Observations on the Evolution of Cyber Tactics in 2013
“There is one thing stronger than all the armies in the world, and that is an idea whose time has come.” – Victor Hugo The world has reached a point of inflection in cybercrime. As cyberspace abounds with cyber privateers, and many nations of the world become havens for these modern-day pirates, it appears that […] more…Facebook Spam Leverages, Abuses Instagram App
The downside of popularity is that cybercriminals tend to abuse it for their own nefarious ends. Case in point, social networking sites have been often used to proliferate malware. Just recently, we spotted a Facebook clickjacking attack that leverages and abuses Instagram to point users to malicious websites. Users encounter this threat by being tagged […] more…Beware, the Curious Case of iPhone Spyware
The new iPhone spy app launched officially by the Apple Store ought to be turning quite a few heads at this point. The name of the app is enough to stop everyone in their tracks. ‘Stalker’ is now available for download and only costing a meager 99 cents, there is no reason that anyone should not be one. […] more…More information
- Zero-day exploit lets App Store malware steal OS X and iOS passwords
- Blaster from the past: The worm that zapped XP 10 years ago
- Microsoft employees start collecting their free Surface RTs
- Security firm spies on Reuters correspondent
- Adobe patches actively exploited ColdFusion vulnerabilities
- Inside the $100M ‘Business Club’ Crime Gang
- SAP Patches Critical Issues With November 2017 Security Updates
- Resolved: Maintenance: Document Imaging Docfinity System (Multi) will be unavailable
- Starbucks still grappling with fraud in online accounts, gift cards
- Online Sandbox Services Used to Exfiltrate Data: Researcher