VirusTotal += Mac OS X execution
We previously announced sandbox execution of Windows PE files in 2012, and Android in 2013. We are happy to announce equal treatment for Mac OS X apps. Files scanned that are Mach-O executables, DMG files, or ZIP files containing a Mac app, will be sent to the sandbox in order to produce behavioral reports. Users may scan […] more…New Headaches: How The Pawn Storm Zero-Day Evaded Java’s Click-to-Play Protection
Several months ago, we disclosed that Pawn Storm was using a then-undiscovered zero-day Java vulnerability (CVE-2015-2590) to carry out its attacks. At the time, we noted that a separate vulnerability was used to bypass the click-to-play protection that is in use by Java. This second vulnerability (CVE-2015-4902) has now been patched by Oracle as part of […] more…Best Budget smart phones in 2015
The best smart phones which are high in specifications and are of cheapest price are listed with configurations and features. Latest android versions and 4G Connectivity are enabled in some phones with high advanced graphical experience. Micromax Spark (4999/-) The spark hits 4.7 inches IPS screen with 960*540 pixels resolution and quad core processor which […] more…Report: New hack lets an attacker bypass password-locked Android home screens
If no one has been able to convince you to take your device’s security seriously, perhaps this hack will do it. A video uncovered by Ars Technica shows someone able to use the emergency call access to gain entry to a locked phone, even though it’s protected with a password. The individual in the video […] more…Microsoft renews information-sharing partnership with NATO
Microsoft and NATO have agreed to renew a longstanding partnership that will see the tech giant provide the intergovernmental treaty group’s Communications and Information Agency with details of Microsoft products and services, as well as new information about cybersecurity threats. It’s part of the company’s Government Security Program, which was created in 2002 to provide […] more…The GasPot Experiment: Hackers Target Gas Tanks
Physically tampering with gasoline tanks is dangerous enough, given how volatile gas can be. Altering a fuel gauge can cause a tank to overflow, and a simple spark can set everything ablaze. But imagine how riskier it is if a hacker can do all this remotely, especially now that a number of fuel companies worldwide […] more…Angler Exploit Kit Used to Find and Infect PoS Systems
An attack aiming to infect PoS systems was found using the Angler Exploit Kit to push a PoS reconnaissance Trojan,This Trojan, detected as TROJ_RECOLOAD.A, checks for multiple conditions in the infected system like if it is a PoS machine or part of a PoS network. It then proceeds to download specific malware depending on the […] more…New GamaPoS Malware Piggybacks on Andromeda Botnet; Spreads in 13 US States
We discovered GamaPoS, a new breed of point-of-sale (PoS) threat currently spreading across the United States and Canada through the Andromeda botnet. GamaPoS is the latest in a long list of threats that scrape off credit card data from PoS systems. Compared to its predecessors, GamaPoS uses malware coded using the .NET framework—a first in PoS […] more…The Upload: Your tech news briefing for Monday, July 6
Surveillance firm Hacking Team gets hacked Who watches the watchmen? Italian online surveillance company Hacking Team appears to have been hacked, with attackers releasing what purports to be a trove of internal documents showing how the company helps governments around the world spy on their citizens. CSO has the details. Microsoft’s $2.5B marketing budget: Minecraft […] more…Lordfenix: 20-year-old Brazilian Makes Profit Off Banking Malware
A 20-year-old college student whose underground username is Lordfenix has become one of Brazil’s top banking malware creators. Lordfenix developed his underground reputation by creating more than a hundred online banking Trojans, each valued at over US$300. Lordfenix is the latest in a string of young and notorious solo cybercriminals we’re seeing today. Who is […] more…MERS News Used in Targeted Attack against Japanese Media Company
Attackers used news of the Middle East Respiratory Syndrome (MERS) outbreak as hook in a spear-phishing email sent to an employee of a popular Japanese mass media company. Using a free account from Yahoo! Mail to easily pass through anti-spam filters, the attackers copied publicly available information from the Internet to lure the recipient to […] more…The Duqu 2.0 persistence module
We have previously described how Duqu 2.0 doesn’t have a normal “persistence” mechanism. This can lead users to conclude that flushing out the malware is as simple as rebooting all the infected machines. In reality, things are a bit more complicated. The attackers created an unusual persistence module which they deploy on compromised networks. It […] more…Statistics on botnet-assisted DDoS attacks in Q1 2015
Statistics on botnet-assisted DDoS attacks in Q1 2015 [pdf] Methodology A DDoS (Distributed Denial of Service) attack is one of the techniques mostly often used by cybercriminals. It is intended to reduce an information system, typically a website, to a state where it cannot be accessed by legitimate users. One popular DDoS scenario is a […] more…Grabit and the RATs
Not so long ago, Kaspersky clients in the United States approached Kaspersky researchers with a request to investigate a new type of malicious software that they were able to recover from their organizations’ servers. The malware calls itself Grabit and is distinctive because of its versatile behavior. Every sample we found was different in size […] more…New Router Attack Displays Fake Warning Messages
Just because security researchers report about threats doesn’t mean we’re exempted from them. I recently experienced an incident at home that involved tampered DNS router settings. I was redirected to warning pages that strongly resemble those used in previous FAKEAV attacks. I noticed that my home internet router DNS settings have been modified from its default settings. (My router […] more…Organizational Challenges in the Internet of Things
As a result of the increase in cyber-attacks launched by nation-states, cybercriminals, hacktivist groups and other entities, it has become increasingly important to understand the ecosystem of hardware, O/S, software, and services that are used in each organization’s network, including the data/telemetry that is collected and sent outside the organization’s network. This problem is especially magnified with […] more…More information
- Microsoft says no more blocking Windows Store on Pro edition
- Adobe pushes critical Flash Player update to fix latest zero-day
- EU Member States Approve US Data Deal
- Microsoft Windows SMB Server CVE-2018-0833 Denial of Service Vulnerability
- FBI Exposing Sensitive Data via Improper Handling of Storage Devices: Audit
- How Mobile Malware Uses The Web
- New Legislation Aims to Strengthen Cybersecurity of K-12 Schools
- Adobe’s source code was parked on hackers’ unprotected server
- GDPR is just over a year away – and many firms are nowhere near ready
- Microsoft Windows Kernel ‘Win32k.sys’ CVE-2017-8666 Local Information Disclosure Vulnerability