Businesses were hit hardest by inbox-based scams in 2015 that robbed U.S. companies of $263 million.
Browsing Category: Malware
Wekby attackers are turning to the technique known as DNS tunneling in lieu of more conventional HTTP delivery of command and controls for remote access control of infected computer networks.
Researchers at Kaspersky Lab have identified six APT groups using exploits for a Microsoft Office flaw that was patched in September 2015.
Details of an extensive targeted attack against Swiss defense contractor RUAG were released by Switzerland’s national CERT.
The tenacious EITest malware campaign is being refueled by the fact it is shifting from the Angler exploit kit to the Neutrino exploit kit.
SWIFT reminds banks of their responsibility in securing their access to the financial network, and creates a centralized information sharing resources for users.
Microsoft warns of new technique to distribute macro malware that can evade standard virus detection, according to security experts.
Mike Mimoso and Chris Brook discuss the news of the week, including a big LinkedIn breach, TeslaCrypt closing up shop, and a breakthrough in random number generation. The two also recap this week’s Source Conference in Boston.
Duo Labs describes how a critical Android vulnerability chains two exploits together to completely pwn an Android OS device.
The criminals behind the TeslaCrypt ransomware have closed up shop and publicly released the master decryption key that unlocks files encrypted by the malware.