Browsing Tag: malware

Categories: Malware, Web Security

[img_assist|nid=5264|title=|desc=|link=none|align=left|width=100|height=100]CAMBRIDGE–Researchers and security vendors have been telling us for years now that attackers  have developed sophisticated, targeted attacks designed to separate victims from their money as quickly and cleanly as possible. If that’s so, why aren’t all of us being compromised on a regular basis? A researcher from Microsoft Research posited at the WEIS 2010 workshop Tuesday that the answer is simple economics.

Read more...

Categories: Malware, Web Security

[img_assist|nid=5260|title=|desc=|link=none|align=right|width=100|height=100]CAMBRIDGE — For a minimal investment of about $160, a single porn site operator can infect more than 20,000 computers with malware for use in cybercrime, according to an academic study presented at the Workshop on the Economics of Information Security (WEIS 2010).

Read more...

Categories: Malware, Web Security

[img_assist|nid=5239|title=|desc=|link=none|align=left|width=100|height=100]LIMASSOL, CYPRUS–The operators of large-scale botnets such as Gumblar and others for years have relied upon stealth, creativity and guile to hide their creations from researchers and authorities for as long as possible. This has been especially vital for botnets with centralized command-and-control mechanisms. But the recent success of sophisticated, resilient peer-to-peer botnets has shown that level of effort isn’t necessary anymore.

Read more...

Categories: Malware

[img_assist|nid=5217|title=|desc=|link=none|align=left|width=100|height=100]Another mobile-phone manufacturer has fallen victim to an increasingly common attack in which phones’ memory cards are infected with malware during the manufacturing process and then shipped out to customers. The latest victim is Samsung, which has acknowledged that the microSD cards in a batch of its S8500 Wave mobile phones sold in Germany were infected with an autorun Trojan.

Read more...

Categories: Malware, Vulnerabilities

[img_assist|nid=5191|title=|desc=|link=none|align=left|width=100|height=100]LIMASSOL, CYPRUS–When an unknown attacker compromised three domains belonging to the U.S. Bureau of Engraving and Printing last month, it became big news, mainly for the brazenness of the attack against a federal Web site. The bigger news, however, turned out to be that the attack involved the use of the Eleonore exploit kit, a sophisticated and well-developed toolkit for attackers.

Read more...

Categories: Vulnerabilities

[img_assist|nid=5136|title=|desc=|link=none|align=left|width=87|height=87]In case you needed any reminders that privacy is one of the more pressing problems on the Web right now, this week’s news provided plenty of them. Along with stories of Facebook’s continued privacy missteps, this week gave us the gift of Google letting users install some Google code to opt out of other Google code, as well as Adobe perhaps moving to a monthly patch cycle. Read on for the full week in review.

Read more...

Categories: Malware, Vulnerabilities

This was an amazingly busy news week in the security world, with a lot of major stories competing for your attention: Microsoft sharing pre-patch vulnerability data with foreign governments, IBM handing out certified pre-owned USB keys, Google spying on Wi-Fi users. If you missed anything, never fear, we’ve got a quick review of that matters from the last week. Read on.

Read more...

[img_assist|nid=5001|title=|desc=|link=none|align=right|width=100|height=100]Two developers have refined techniques for rummaging through browser
histories to the extent that web sites can now find out what articles a
user has recently read on news sites, their exact postcode and which
search terms that have entered into search engines. Read the full article. [The H Security]

Read more...