Travnet Botnet Controls Victims With Remote Admin Tool

The malicious binary behind the Travnet botnet has been updated. The new code has a new compression algorithm, steals the list of running processes, adds new file extensions to its list of files to steal, and has improved its control commands. Also, after the malware has uploaded the stolen files on its remote server, the Read more…

A Phone Call, a Phish, and a Remote Access Trojan

In April 2013, Symantec was alerted to a series of sophisticated social-engineering attacks targeting a limited set of organizations in Europe. The most distinguishing feature of these attacks is that the victim will receive a phone call from the attac…

How To bCyberwise With Your Password

Communicating with tweens and teens can be super challenging. Some prefer to simply grunt, others go with the monosyllabic strategy and the rest will only speak if it’s about food! I find that I really only have a few minutes a day to share ‘key agenda items’ with my teen boys and it is usually Read more…

Three Key Takeaways from the 2013 Verizon Data Breach Report

It’s that time again, where we look back at the year passed and assess how the threat landscape has changed—for better and for worse. The 2013 Verizon Data Breach Investigations Report (DBIR) reveals that last year was not only defined by the varied nature of cyberattacks, but also by the increased frequency of these incidents in general. Read more…

When Web Servers Serve Evil

      No Comments on When Web Servers Serve Evil

In the last few months, we have witnessed a rise in the number of cases of modified Web servers that inject malicious redirections into every website that it hosts. One example was the malicious Apache module (Linux.Chapro and Trojan.Apmod) that we blo…

Mystery/Secret Shopper Schemes

      No Comments on Mystery/Secret Shopper Schemes

The IC3 has been alerted to an increase in employment schemes pertaining to mystery/secret shopper positions. Many retail and service corporations hire evaluators to perform secret or random checks on themselves or their competitors, and fraudsters are capitalizing on this employment opportunity. Victims have reported to the IC3 they were… Read more »

#avastBeFree: AVAST is looking for its next Photo Contest Winners!

One year ago, Avast launched avast! Free Antivirus for Mac, and celebrated with our first photo contest. The results were outstanding – we received 50,000 photos with “APPLE” as the topic, and  our Facebook page became the 5th fastest growing page worldwide during the first week of the competition! Your enthusiatic reponse told us that: You are […]

What you need to know to migrate from 1024-bit to 2048-bit encryption

I hope by now that you are aware that the Certificate Authority/Browser Forum has mandated that Certificate Authorities stop supporting 1024-bit key length RSA certificates for both SSL and code signing by the end of this year (2013). To learn more abo…

Have mergers, acquisitions and changes in vendors’ strategies benefited cloud email and web security customers?

Part 1 – changes in the industry
The email and web security industry has seen many changes over the past years, especially in the cloud or SaaS market. Many vendors in this space started by offering email anti-malware and anti-spam services. They…