Ransomware Moves to Mobile
Ransomware continues to make waves, especially with the rise of file-encrypting ransomware like CryptoLocker. However, we are seeing yet another alarming development for this malware: it is now targeting mobile devices. Reveton Makes a Comeback In early May, it was reported that this mobile ransomware was the product of the Reveton gang. Reveton was one of […] more…Brazilian Users Being Scammed with 2014 FIFA World Cup Tickets
As the 2014 FIFA World Cup Brazil draws near, we are seeing more threats using the event as bait. We recently talked about cybercriminals in Brazil taking advantage of the event to spread malware, but we’ve found that the threats have gone beyond that: we’ve spotted fake FIFA websites selling game tickets. One of the sites […] more…Resolved: nfs.pss.psu.edu partial outage
On Friday, May 16 from 5:13 p.m. – 5:25 p.m. and Sunday, May 18 at 7:48 p.m. through Monday, May 19 at 7:50 a.m. one of the nfs.pass.psu.edu backend servers stopped working properly. The problem server was restarted both times. Existing and new clients may have received errors during the partial failures. Customers using the […] more…Avast: Users frequently hitting websites loaded with ransomware
Fresh statistics from the maker of a widely used free security product show the extent to which users are encountering file-encrypting malware known as ransomware. read more more…Phishers Cast Wider Net, Now Asking for Multiple Emails
From a security perspective, phishing attempts are pretty much old hat. In most cases, phishing attempts or attacks focus on getting one particular credential, such as those for credit cards or user accounts. We are now seeing cybercriminals attempt to get more credentials by using phishing pages that allow for multiple email logins. Multiple Logins […] more…Android App Components Prone to Abuse
We’ve recently found a vulnerability in certain Android apps that may leave user data at risk of being captured or being used to launch attacks. The two affected apps we investigated are both highly popular: The productivity app has at least 10M installs and hundred thousands of customer reviews based on their download page The […] more…Targeted Attack Against Taiwanese Agencies Used Recent Microsoft Word Zero-Day
Vulnerabilities, particularly zero-days, are often used by threat actors as the starting point for targeted attacks. This was certainly the case for a (then) zero-day vulnerability (CVE-2014-1761) affecting Microsoft Word. In its security advisory released last March, Microsoft itself acknowledged that the vulnerability was being used in “limited, targeted attacks.” Microsoft has since patched this […] more…Microsoft still losing money with Surface tablets
Microsoft’s Surface 2 and Surface Pro 2 tablets may be selling better than their first generation counterparts, but revenues from the Windows RT and 8.1 devices are still not making up for the amount of money the company is spending on its PC hardware products. Tags: Microsoft Hardware more…Q1 2014 Mobile Threat Report
Our Mobile Threat Report for Q1 2014 is out! Here’s a couple of the things we cover in it: The vast majority of the new threats found was on Android (no surprise there), which accounted for 275 out of 277 new families we saw in this period, leaving 1 new malware apiece on iOS and […] more…AdSense Blackmail – Hacking Websites for Profit
We deal with different types of malware injections and compromises everyday and the most common question our clients ask us is, “Why me? Why my small little site?” There are so many answers to this question. In some cases, someone may attack a site for fun, they may do so in the name of “Hacktivism” […] more…CeCOS VIII – Hong Kong
The eighth annual Counter-eCrime Operations Summit (CeCOS VIII) was held in Hong Kong on April 8th , 9th and 10th, 2014. The event brings together global leaders from financial services, technology, government, law enforcement, communications sectors and research centers. Cybercrime fighters from the field examined: – Public-source criminal tracking techniques – Cloud and mobile malware […] more…The First Line of Defense: IT Personnel
The year so far has been a particularly stressful one for enterprise IT staff. Early in the year, concerns over data breaches and point of sale POS malware gave retailers something to worry about. The long-simmering headache of Windows XP migration came to a head when support for the venerable OS ended in April. That would […] more…Old Java RAT Updates, Includes Litecoin Plugin
Out with the old, in with the new? When it comes to cybercrime, that’s rarely the case. We often seen old malware get upgrades with new techniques, payloads, and even targets. This is certainly the case for an old Java remote access Trojan (RAT) detected as JAVA_OZNEB.B. Users may encounter this threat as an attachment […] more…Macro-Enabled Files Used as Infection Vectors (Again)
Macro-based attacks were popular in the early 2000s, but they gained much notoriety with the much publicized coverage of the Melissa virus. However, macro-based attacks soon began to drop off the radar. One major reason for this would be the security measures implemented by Microsoft to address malicious macro files. Another probable reason would also […] more…Android Botnet Targets Middle East Banks
I recently encountered a botnet targeting Android smartphone users who bank at financial institutions in the Middle East. The crude yet remarkably effective mobile bot that powers this whole operation comes disguised as one of several online banking apps, has infected more than 2,700 phones, and has intercepted at least 28,000 text messages. Tags: Android […] more…Managing Windows XP’s Risks in a Post-Support World
There are now less than two weeks left until Microsoft terminates support for the incredibly long-lived Windows XP. Rarely has a tech product lasted as long as XP has – from XP’s launch on October 25, 2001 to its last Patch Tuesday on April 8, 2014 a total of 12 years, 5 months, and two […] more…More information
- Silk Road coupon forger charged with wire fraud
- UN human rights chief warns of worldwide privacy implications of Apple-FBI case
- Microsoft Internet Explorer CVE-2015-1710 Remote Memory Corruption Vulnerability
- Wading Through Tool Overload and Redundancy?
- MedTech Giant Stryker Crippled by Iran-Linked Hacker Attack
- The Importance of Security Awareness in Our Connected Lifestyle
- Security basics for the holiday season, and the year to come
- Website Malware – SEP Attack – SPAM Link Farm
- FBI: $1.45 Billion in Losses to Internet Crime Reported in 2016
- SSCC 179 – What kind of a name is "Lizard Squad"? [PODCAST]