Java-based Trojan was used to attack over 400,000 systems
A cross-platform remote access Trojan that’s being openly sold as a service to all types of attackers, from opportunistic cybercriminals to cyberespionage groups, has been used to attack more than 400,000 systems over the past three years. The RAT (Remote Access Tool/Trojan), which depending on the variant is known as Adwind, AlienSpy, Frutas, Unrecom, Sockrat, jRat or […] more…Kaspersky Security Bulletin. Spam and phishing in 2015
Download PDF The year in figures According to Kaspersky Lab, in 2015 The proportion of spam in email flows was 55.28%, which is 11.48 percentage points lower than in 2014. 79% of spam emails were no more than 2 KB in size. 15.2% of spam was sent from the US. 146,692,256 instances that triggered the […] more…Putting the spotlight on firmware malware
Firmware malware has been a hot topic ever since Snowden’s leaks revealed NSA’s efforts to infect BIOS firmware. However, BIOS malware is no longer something exclusive to the NSA, Lenovo’s Service Engine or Hacking Team’s UEFI rootkit are examples of why the security industry should put some focus on this strain of badness.To all effects BIOS is a firmware […] more…PASS NFS Gateway Upgrade to AES Encryption
Kerberos encryption used by nfs.pass.psu.edu will be upgraded to enable AES, on Wednesday, January 6, during the ITS Maintenance Window (5:00 – 7:00 a.m.). A short outage of a few minutes is anticipated to accommodate the work being completed. As a result of the outage, users may need to re-authenticate to obtain a new service […] more…Keytab Generator Config Change
On Wednesday, January 6, during the ITS Maintenance Window (5:00 – 7:00 a.m.), configuration of the Kerberos Keytab Service Principal and Keytab Generator (Keytab Generator) will be changed to enable or prefer AES encryption types over DES and 3DES. In addition, the “oracle” type service principal will be introduced in the Server Keytabs feature. Personal […] more…VirusTotal += Mac OS X execution
We previously announced sandbox execution of Windows PE files in 2012, and Android in 2013. We are happy to announce equal treatment for Mac OS X apps. Files scanned that are Mach-O executables, DMG files, or ZIP files containing a Mac app, will be sent to the sandbox in order to produce behavioral reports. Users may scan […] more…New Headaches: How The Pawn Storm Zero-Day Evaded Java’s Click-to-Play Protection
Several months ago, we disclosed that Pawn Storm was using a then-undiscovered zero-day Java vulnerability (CVE-2015-2590) to carry out its attacks. At the time, we noted that a separate vulnerability was used to bypass the click-to-play protection that is in use by Java. This second vulnerability (CVE-2015-4902) has now been patched by Oracle as part of […] more…Best Budget smart phones in 2015
The best smart phones which are high in specifications and are of cheapest price are listed with configurations and features. Latest android versions and 4G Connectivity are enabled in some phones with high advanced graphical experience. Micromax Spark (4999/-) The spark hits 4.7 inches IPS screen with 960*540 pixels resolution and quad core processor which […] more…Report: New hack lets an attacker bypass password-locked Android home screens
If no one has been able to convince you to take your device’s security seriously, perhaps this hack will do it. A video uncovered by Ars Technica shows someone able to use the emergency call access to gain entry to a locked phone, even though it’s protected with a password. The individual in the video […] more…Microsoft renews information-sharing partnership with NATO
Microsoft and NATO have agreed to renew a longstanding partnership that will see the tech giant provide the intergovernmental treaty group’s Communications and Information Agency with details of Microsoft products and services, as well as new information about cybersecurity threats. It’s part of the company’s Government Security Program, which was created in 2002 to provide […] more…The GasPot Experiment: Hackers Target Gas Tanks
Physically tampering with gasoline tanks is dangerous enough, given how volatile gas can be. Altering a fuel gauge can cause a tank to overflow, and a simple spark can set everything ablaze. But imagine how riskier it is if a hacker can do all this remotely, especially now that a number of fuel companies worldwide […] more…Angler Exploit Kit Used to Find and Infect PoS Systems
An attack aiming to infect PoS systems was found using the Angler Exploit Kit to push a PoS reconnaissance Trojan,This Trojan, detected as TROJ_RECOLOAD.A, checks for multiple conditions in the infected system like if it is a PoS machine or part of a PoS network. It then proceeds to download specific malware depending on the […] more…New GamaPoS Malware Piggybacks on Andromeda Botnet; Spreads in 13 US States
We discovered GamaPoS, a new breed of point-of-sale (PoS) threat currently spreading across the United States and Canada through the Andromeda botnet. GamaPoS is the latest in a long list of threats that scrape off credit card data from PoS systems. Compared to its predecessors, GamaPoS uses malware coded using the .NET framework—a first in PoS […] more…The Upload: Your tech news briefing for Monday, July 6
Surveillance firm Hacking Team gets hacked Who watches the watchmen? Italian online surveillance company Hacking Team appears to have been hacked, with attackers releasing what purports to be a trove of internal documents showing how the company helps governments around the world spy on their citizens. CSO has the details. Microsoft’s $2.5B marketing budget: Minecraft […] more…Lordfenix: 20-year-old Brazilian Makes Profit Off Banking Malware
A 20-year-old college student whose underground username is Lordfenix has become one of Brazil’s top banking malware creators. Lordfenix developed his underground reputation by creating more than a hundred online banking Trojans, each valued at over US$300. Lordfenix is the latest in a string of young and notorious solo cybercriminals we’re seeing today. Who is […] more…MERS News Used in Targeted Attack against Japanese Media Company
Attackers used news of the Middle East Respiratory Syndrome (MERS) outbreak as hook in a spear-phishing email sent to an employee of a popular Japanese mass media company. Using a free account from Yahoo! Mail to easily pass through anti-spam filters, the attackers copied publicly available information from the Internet to lure the recipient to […] more…More information
- Security expert breaches NASDAQ exchange’s website in just 10 minutes
- The new workplace will be distributed, digital — and full of purpose
- Maryland Confirms Ransomware Attack at Health Agency
- Sabu Gets 6-Month Sentencing Delay for Continuing to Help Feds
- US Disrupts North Korean Hackers That Targeted Hospitals
- 21 New Mac Malware Families Emerged in 2023
- BlackShades users targeted in 16-country law enforcement action
- Snowden reveals automated NSA cyberwarfare program
- Java 7 Update 21 to fix bugs, change applet warning messages
- Unlike Mozilla, Google anticipated SHA-1 errors caused by HTTPS traffic inspection systems