Less than a week after the Moon worm, new and unrelated vulnerabilities have been reported in Linksys home and small office routers. Hackers can use a simple exploit to gain remote access to the boxes.
Browsing Category: Malware
A new campaign, dubbed Operation SnowMan, was been spotted leveraging a previously unknown zero-day in Internet Explorer 10 after the U.S. Veterans of Foreign Wars’ website was compromised this week.
A list of almost 8,000 credentials for FTP sites is circulating on the black market; the list includes high profile targets that are at risk for compromise.
A worm is spreading on a number of home and small business routers manufactured by Linksys. Researchers at the SANS Institute have not been able to determine whether there is a malicious payload or learn much about command and control.
OSX/CoinThief, a Trojan that steals Bitcoin wallet credentials and Bitcoin-QT keys has been found on download sites MacUpdate.com and Download.com.
Implementing an effective detection system for attacks against cars may wind up being far more difficult than expected.
PUNTA CANA–A group of high-level, nation-state attackers has been targeting government agencies, embassies, diplomatic offices and energy companies with a cyber-espionage campaign for more than five years that researchers say is the most sophisticated APT operation they’ve seen to date. The attack, dubbed the Mask, or “Careto” (Spanish for “Ugly Face” or “Mask”) includes a[...]
A new Trojan for Mac OS X disguised as an app for sending and receiving payments steals Bitcoin wallet login credentials.
It would be understandable, even natural, for most casual observers to have grown so completely overwhelmed by the inundation of stories about government surveillance and exploitation techniques that they tuned it out months ago. Why get worked up about something you can’t change?
The range of targets APT groups are going after is widening, as are the levels of talent and financing these groups possess.