Advertisement
Top

Tag: malware


Monitoring&Analysis, Security

The 5 best malware metrics you can generate

May 22, 2018

Via: CSO

A big problem in the computer security world is that practitioners aren’t skeptical enough, don’t question purported authority statements, and often don’t ask the right questions. It’s a theme I see over and over, and it leads defenders to enacting […]


Monitoring&Analysis, Security

5 top trends in endpoint security for 2018

May 11, 2018

Via: CSO

Endpoint security is in many ways the direct descendent of the first forms of computer protection in the earliest days of IT. But it’s a rapidly developing category, as organizations look to coordinate control of the PCs, servers and phones […]


Monitoring&Analysis, Security

Cryptomining, not ransomware, the top malware threat so far this year

April 18, 2018

Via: CSO

Cyptominer-based attacks, not ransomware-based attacks, have been the top threat so far this year, according to Comodo Cybersecurity Threat Research Labs’ Q1 Global Malware Report.In the first three months of 2018, Comodo said it “detected 28.9 million cryptominer incidents out […]


Monitoring&Analysis, Security

What hackers do: their motivations and their malware

April 5, 2018

Via: CSO

Understanding hackers and how they attack Whatever the threat, it is arriving to your computer in one of two ways: human adversary or malware. Human attackers can use any of the hundreds of thousands of known computer exploits and attack […]


Monitoring&Analysis, Security

How to protect your network from PowerShell exploits

February 26, 2018

Via: CSO

Hikers living off the land make use of existing nutrients and water sources to survive in the wilderness. In hacker parlance, the term “survive in the wilderness” means they cover their tracks and make use of tools and code that […]


Monitoring&Analysis, Security

Network analysis can find malware before it strikes

July 5, 2017

Via: Networkworld Security

Network traffic analysis should be used more in the fight against malware. That’s because pointers show up on the network “weeks and even months” in advance of new malicious software being uncovered, scientists from the Georgia Institute of Technology explain […]


Monitoring&Analysis, Security

Nothing new to (Wanna)Cry about

June 1, 2017

Via: Networkworld Security

The WannaCry outbreak has been troubling in many regards – exposing flaws, and opening doors to much finger-pointing and blaming that have gone well beyond the handling and disclosure of nation-state cyber weapon stockpiling. The attackers likely had a good […]


Monitoring&Analysis, Security

Yes, you still need endpoint malware protection

May 19, 2017

Via: Networkworld Security

There has been a steady stream of reports and claims lately that many of us no longer need endpoint security, that antivirus (AV) programs on our PCs are worthless. Gizmodo flat out said that you really don’t need an antivirus […]


Monitoring&Analysis, Security

Snake cyberespionage malware is ready to bite Mac users

May 5, 2017

Via: Networkworld Security

A sophisticated Russian cyberespionage group is readying attacks against Mac users and has recently ported its Windows backdoor program to macOS. The group, known in the security industry as Snake, Turla or Uroburos, has been active since at least 2007 […]


Monitoring&Analysis, Security

Stealthy Mac malware spies on encrypted browser traffic

May 1, 2017

Via: CSO

A new malware program that targets macOS users is capable of spying on encrypted browser traffic to steal sensitive information. The new program, dubbed OSX/Dok by researchers from Check Point Software Technologies, was distributed via email phishing campaigns to users […]


Hardware, Security

How to remove malware from your Windows PC

March 13, 2017

Via: CSO

Is your computer running slower than usual? Are you getting lots of pop-ups? Have you seen other weird problems crop up? If so, your PC might be infected with a virus, spyware, or other malware—even if you have an antivirus […]


Security

Mobile malware – same attacks – different pathogens

February 21, 2017

Via: CSO

Mobile malware traces its roots back to a mobile virus called Timofonica in 2000. Today there are robust examples like Ghost Push which was discovered late in 2015. Ghost Push is a type of malware for Android devices that gains […]


Security

Cybersecurity no longer merger afterthought

December 16, 2016

Via: Networkworld Security

As little as four years ago, only about a third of companies considered cybersecurity when planning a merger. Today, that percentage has flipped. “When you look at mergers where one big company buys another big company, I’d estimate that the […]


Monitoring&Analysis

How analytics can protect you from Amy Schumer (malware)

October 3, 2016

Via: CSO

This was interesting in so many ways, this week McAfee issued a report showing how malware delivery using compromised websites and gaming Google search analytics has suddenly become a lot smarter. What these criminals are doing is they are watching […]


Security

Advanced Malware Evasion Techniques HTTP-Evader

September 16, 2016

Via: Cisco Blog

Malware doesn’t play by the rules, so today’s IT infrastructure needs to provide several layers of defense for end-users. Some of the more common devices used to protect modern networks are Intrusion Prevention systems (IPS) and Firewalls. In recent years, […]


Security, Software

FTC focuses on combating ransomware

September 14, 2016

Via: CSO

Ransomware, where a hacker commandeers a user’s computer files and threatens to permanently delete them unless an extortion payment is made, is on a sharp uptick and now ranks “among the most troubling cyberthreats,” the head of the Federal Trade […]


Security

Can cybersecurity save the November elections?

September 7, 2016

Via: Networkworld Security

The Federal Bureau of Investigation’s disclosure earlier this month that foreign hackers had infiltrated voter registration systems in Illinois and Arizona came as no surprise to some cybersecurity experts. “Given where cybercrime has gone, it’s not too surprising to think […]


Security

What are hackers up to these days?

August 2, 2016

Via: CSO

The short answer: They’re targeting sites in North America, where they’re planting malware in ad networks and launching dating site spam. The long answer is more complex, but security vendor Trustwave offered some insights in its 2016 Trustwave Global Security […]


Security

Over 100 DDoS botnets built using Linux malware for embedded devices

July 1, 2016

Via: CSO

LizardStresser, the DDoS malware for Linux systems written by the infamous Lizard Squad attacker group, was used over the past year to create over 100 botnets, some built almost exclusively from compromised Internet-of-Things devices. LizardStresser has two components: A client […]


Security

This malware pretends to be WhatsApp, Uber and Google Play

June 29, 2016

Via: CSO

Hackers are stealing credit card information in Europe with malware that can spoof the user interfaces of Uber, WhatsApp and Google Play. The malware, which has struck Android users in Denmark, Italy and Germany, has been spreading through a phishing […]