Browsing Tag: malware

Categories: Malware

A new report published today sheds light on the
steps ultra-sophisticated attackers take to gain a foothold inside
governments and company networks and remain entrenched in order to
steal intellectual property and other data. The bad news is these
attacks — including the recent ones on Google, Adobe, and other
companies — almost always are successful and undetectable until it’s
too late.
Read the full article [Darkreading.com].

Read more...

Categories: Vulnerabilities

[img_assist|nid=2926|title=|desc=|link=none|align=right|width=100|height=100]The recent attack on the PlayStation 3 hypervisor has gotten a tremendous amount of attention, but there has not been much in the way of detailed analysis of the actual exploit itself. However, a prominent cryptographer and security researcher has looked at the exploit and found that it is a cleverly implemented attack that is quite difficult to defend against.

Read more...

[img_assist|nid=2897|title=|desc=|link=none|align=left|width=100|height=100]Popular technology site TechCrunch was hit by potty-mouth hackers late on Monday, leaving the site temporarily unavailable.

A notice on TechCrunch.com’s front page on Tuesday morning explains that “TechCrunch.com was compromised by a security exploit”. Read the full article. [The Register]

Read more...

Categories: Malware, Vulnerabilities

[img_assist|nid=2893|title=|desc=|link=none|align=right|width=100|height=100]Having mastered the art of poisoning search engine results for .com sites, attackers are now turning their attention to .edu sites, linking their keyword campaigns to educational institutions as a way of lending their malicious sites more credence in the eyes of Google.

Read more...

Categories: Malware

[img_assist|nid=2854|title=|desc=|link=none|align=right|width=100|height=100]By Atif Mushtaq, FireEyeIt’s very rare that we researchers get
a chance to explore the inner workings of a botnet command and control
server.  Detailed insight into the botnet server or command component
can give us valuable information about the motives of the botnet and
possibly the bad guys behind it. But granting access to these command
and control servers often depends on the will of the hosting providers.
So what happened in this case?

Read more...

Categories: Malware

[img_assist|nid=2853|title=|desc=|link=none|align=left|width=100|height=100]Two of the seven directory authority servers that the Tor Project uses to run its anonymous browsing service have been compromised, along with a new server that the project uses to host metrics and graphs.

Read more...

Categories: Malware

Security researchers are continuing to delve into the details of the malware that’s been used in the attacks against Google, Adobe and other large companies, and they’re finding a complex package of programs that use custom protocols and sophisticated infection techniques.

Read more...