19 Sep 2018

Researchers: Users allowed to access infected sites found through search engines

“Users are largely allowed to access infected websites found through search engines, according to new research published Tuesday. Security firm SiteLock scanned more than 6 million of their clients’ sites during the second quarter of 2018. The firm found only 17 percent of infected sites are blacklisted by search engines like

Read More
16 Aug 2018

India’s Cosmos Bank loses $13.5 mln in cyber attack

Cyber thieves stole $13.5 million by using malware to withdraw cash in 14,849 transactions in 28 countries, all within 2 hours. The malware attack redirected payments to a proxy switching system responsible for processing payment requests. This proxy approved the fraudulent requests. Police are pursuing the matter, but with little

Read More
14 Aug 2018

Russian Military Spy Software is on Hundreds of Thousands of Home Routers

“The Russian military is inside hundreds of thousands of routers owned by Americans and others around the world, a top U.S. cybersecurity official said on Friday. The presence of Russian malware on the routers, first revealed in May, could enable the Kremlin to steal individuals’ data or enlist their devices in

Read More
01 Aug 2018

Chinese “hackers” are sending malware via snail mail

Highlighting the importance of the human element in hacking, Chinese hackers are sending malware-laden CDs to state officials. The CDs contain simple malware embedded in Word files that compromises the victims computer when opened. While it is unknown whether anybody inserted one of the CDs and opened files, the attempt

Read More
01 Aug 2018

Advanced “Malvertising” Campaign Exploits Online Advertising Supply Chain

A “Malvertising” campaign has used legitimate online advertising supply chains to distribute malicious adverts around the world. Because the return from clicks on malicious ads is so instantaneous, the posters are willing and able to outbid legitimate advertisements. “The ads often contain malicious code that exploits unpatched vulnerabilities in browsers

Read More
03 Jul 2018

Clipboard Hijacker Malware Monitors 2.3 Million Bitcoin Addresses

Hackers have developed a malware (CryptoCurrency Clipboard Hijackers) that monitors the Windows clipboard for copied cryptocurrency addresses. When these addresses are pasted in order to send funds, the malware inserts an address owned by the hacker. Because cryptocurrency addresses are long strings of numbers, users rarely notice or double check

Read More
29 Jun 2012

The Threat From Bad Malware Analysis

The leak that the U.S. was apparently behind the Stuxnet worm that impacted the Nataz nuclear enrichment facility in Iran came – as it always does – with a rash of analysis and opinion related to the hazards associated with “sophisticated” malware and “cyber weapons.” But it is a reliance

Read More