Malware News
|
It's been reported that Subway customers in the UK are receiving scam emails as part of a phishing attack. The emails also use the victims' names, and appear to come from the chain's Subcard loyalty scheme.
|
|
The U.S. government's cybersecurity agency issued a security advisory has issued a warning to federal agencies and the private sector about a notable increase in the use of LokiBot malware by malicious cyber actors.
|
|
The U.S. FBI has released a new cybersecurity advisory to academic, public, and private sector partners across the country about previously undisclosed malware attributed to Iranian nation state actors publicly known as Advanced Persistent Threat 39.
|
|
Over one billion Android devices have been left vulnerable to hacking since Google no longer offer security updates on older operating systems. Will La Sala explains the implications to Digital Journal.
|
|
News reports indicate that a new malware strain, dubbed Haken, has been discovered within several apps on the Google Play store. Sam Bakken explains that this is just the latest issue to hit Play.
|
|
Over the next decade, businesses will face maturing cybercrime and renewed nation-state cyberattacks. Both of these threats are key areas for which businesses need to be aware, as well as for governments to take action.
|
|
Landry’s Inc., a restaurant and hospitality corporation that owns popular eateries such as McCormick and Schmick’s, Rainforest Cafe and Del Frisco’s, was infected by malware that infected its order-entry systems to steal customer payment card inform
|
|
There are various forms of malware attacks and the latest to be concerned about is so-called ‘zombie malware’, a type of malware that transforms a computer into a slave so that attacks can be performed remotely.
|
|
A novel VPNFilter malware has affected 500,000 networking devices globally. Marina Kidron, Director of Threat Intelligence in the Skybox Research Lab looks at what is know so far.
|
|
In the last few days, criminals have compromised tens of thousands of Facebook accounts using a what at first glance appears to be a paint program for relieving stress.
|
|
Google has published its fourth Android Security Review in which it details its progress in protecting ecosystem. The company is trying to address the perception that Android is less secure than iOS, claiming the two platforms now have security parity.
|
|
Cybercriminals have developed an effective way to clone chip-and-pin cards, according to research from Kaspersky Lab. The Prilex campaign has been active for over three years and is designed to subvert the latest protections introduced by card companies.
|
|
Security researchers have discovered a "highly sophisticated" malware which has been targeting Wi-Fi routers for over six years. It's thought Slingshot is the product of a state-sponsored cyberespionage campaign.
|
|
Microsoft's PowerShell scripting engine is becoming the target of choice for attackers looking to sneak exploits onto Windows systems. Research conducted by McAfee found the use of "fileless" hacking, using scripts instead of programs, is rapidly growing.
|
|
Attackers could slip malware past Windows 10's built-in detection systems by prepending null characters to files. A security researcher discovered that Windows' Anti-Malware Scan Interface ignores everything after it encounters an empty character.
|
|
A backdoor that exploits raw Linux sockets is giving attackers control of servers, security researchers have warned. They found malware is infecting systems by guessing passwords used to protect remote control systems. It works by monitoring socket data.
|
|
An extensive botnet of Android devices has rapidly grown since coming to life this week. The ADB.Miner attack is infecting phones and using them to mine cryptocurrency coins. It's the latest example of a new class of crypto-mining cyberattack.
|
|
Apple and Cisco have partnered with insurance companies to offer a discounted cyber insurance service. Businesses that source their hardware from Apple and Cisco will be able to claim a reduction on insurance policies sold by Allianz SE.
|
|
Google removed over 700,000 Android apps last year for violating its policies. It said new machine learning techniques helped it achieve the 70% increase in removals over 2016. The company claimed 99% of apps were removed before anyone installed them.
|
|
Security researchers have documented a way to unlock a target's phone using readings from "zero-permission" sensors. Apps can access sensors such as the accelerometer and gyroscope without special permissions. The readings can be used to deduce your PIN.
|
|
A popular website plugin used by over 300,000 publishers contains a backdoor that could be used to compromise sites. The plugin recently changed hands, allowing the attackers to purchase a widely-used plugin that could be silently updated to spy on users.
|
|
Over 90% of cybersecurity leaders are concerned hackers will use AI to attack their company, according to a new report. Faced with increasingly sophisticated threats, businesses are looking towards defences which use AI to proactively respond to attacks.
|
|
HP has admitted to installing a keylogger on hundreds of its laptops. Some of the company's most popular models are among those affected. The code was discovered inside HP's keyboard driver software by a security researcher investigating laptop keyboards.
|
|
A botnet of 100,000 home broadband routers is lying dormant and could be activated at any time, according to a security researcher. A new strain of the virulent IoT malware Mirai is being used to amass devices, perhaps in preparation for a major attack.
|
|
Android smartphones accounted for the majority of malware attacks over the past year, behind devices running Windows. The figures come from Nokia's Threat Intelligence Lab which warned more needs to be done to keep mobile users secure.
|
|
An antivirus software exploit could allow malware to escape quarantine and infect your system. A vulnerability found in several antivirus solutions gives an attacker a way to bypass usual mechanisms and gain full control of sensitive filesystem areas.
|
|
Sydney -
Between the teeming hordes of hype merchants and the very meagre actual products, augmented reality is taking some baby thinking steps into practical things. MIT is looking at making AR safe for users.
|
|
Equifax, the credit rating reporting agency that exposed personal data of nearly 150 million people, (and recently was awarded a contract by the IRS to confirm taxpayer's identities), appears to have been hacked — again.
|
|
More websites are including cryptocurrency miners that use your device's CPU to generate digital coins. After a miner was found on The Pirate Bay last month, more torrent sites have added scripts. Hackers are also adding miners to websites they hijack.
|
|
The malware found bundled with popular computer maintenance software CCleaner was designed to compromise machines at some of the world's biggest tech companies. The discovery suggests the attack was more significant than first thought.
|
apis-430520 apis-427482 apis-425781 apis-414602 apis-413768 apis-412521 apis-410711 apis-409808 apis-370402 apis-363938 apis-361194 apis-361192 apis-360846 apis-360736 apis-358929 apis-358601 apis-357747 apis-357519 apis-357084 apis-354618 apis-353803 apis-353371 apis-352977 apis-352466 apis-350963 apis-350684 apis-348771 apis-347946 apis-347650 apis-346092
Malware Image
Babylon is another scam search engine. Don't click the link, don't click anything, close the page and get rid of it.
Mamba ransomware infects the MBR to display a custom decryption prompt before Windows starts Renato Marinho
Digital Signature of CCleaner 5.33 Cisco Talos
Typical invoice email sent by Necurs botnet. Symantec
Gooligan malware Check Point Security Technologies
No More Ransom helps people recover from ransomware attacks No More Ransom
Gooligan malware Check Point Security Technologies
Gooligan malware Check Point Security Technologies
Do not open this program. Radware
Fake Windows 10 activation ransomware prompt Symantec
The Rombertik malware wipes hard drives when detected Cisco
TeslaCrypt encrypts game files on infected systems, demanding a ransom for their release Bromium Labs
The malware bundled with CCleaner targeted "at least" 20 of the world's largest tech firms Pexels / Tookapic
The known reach of the Slingshot malware Kaspersky Labs
Google's Verify Apps can identify potentially malicious Android apps based on device retention after install Google
Qualcomm's Smart Protect technology in its Snapdragon 820 processor will provide malware protection directly from the chip [YouTube still] Qualcomm
"Missing fonts" Chrome malware Mahmoud Al-Qudsi
InstaAgent, an Instagram client that stole the passwords of hundreds of thousands of users David-LR (@PeppersoftDev)
Gooligan malware Check Point Security Technologies
|
|