The malicious binary behind the Travnet botnet has been updated. The new code has a new compression algorithm, steals the list of running processes, adds new file extensions to its list of files to steal, and has improved its control commands. Also, after the malware has uploaded the stolen files on its remote server, the Read more…
In April 2013, Symantec was alerted to a series of sophisticated social-engineering attacks targeting a limited set of organizations in Europe. The most distinguishing feature of these attacks is that the victim will receive a phone call from the attac…
It’s that time again, where we look back at the year passed and assess how the threat landscape has changed—for better and for worse. The 2013 Verizon Data Breach Investigations Report (DBIR) reveals that last year was not only defined by the varied nature of cyberattacks, but also by the increased frequency of these incidents in general. Read more…
In the last few months, we have witnessed a rise in the number of cases of modified Web servers that inject malicious redirections into every website that it hosts. One example was the malicious Apache module (Linux.Chapro and Trojan.Apmod) that we blo…
The IC3 has been alerted to an increase in employment schemes pertaining to mystery/secret shopper positions. Many retail and service corporations hire evaluators to perform secret or random checks on themselves or their competitors, and fraudsters are capitalizing on this employment opportunity. Victims have reported to the IC3 they were… Read more »
I hope by now that you are aware that the Certificate Authority/Browser Forum has mandated that Certificate Authorities stop supporting 1024-bit key length RSA certificates for both SSL and code signing by the end of this year (2013). To learn more abo…
Part 1 – changes in the industry
The email and web security industry has seen many changes over the past years, especially in the cloud or SaaS market. Many vendors in this space started by offering email anti-malware and anti-spam services. They…
The 58th season of the UEFA Champions League is coming to an end with the final being played on May 25 at Wembley Stadium in London. Nowadays, cybercriminals are gaining a lot of interest in football, at least inasmuch as how to exploit interest in foo…
This year’s ISTR illustrates more clearly than ever before that the path of least secure resistance is going to be the path taken by hackers.
In years past, the profile of a hacker was an idle college kid or ‘script kiddie’, and accou…