[img_assist|nid=2951|title=|desc=|link=none|align=left|width=100|height=100]More than half (55.59 per cent) of all malware sent on email is an attempted phishing attack, according to analysis of malware by researchers. Read the full article. [Help Net Security]
Browsing Tag: malware
Costin Raiu, chief security expert at Kaspersky Lab in Romania, discusses the state of the threat landscape for the year ahead, including botnets, malicious PDFs and targeted attacks.
A new report published today sheds light on the
steps ultra-sophisticated attackers take to gain a foothold inside
governments and company networks and remain entrenched in order to
steal intellectual property and other data. The bad news is these
attacks — including the recent ones on Google, Adobe, and other
companies — almost always are successful and undetectable until it’s
Read the full article [Darkreading.com].
The last quarter of 2009 saw an average of 13,400 attempts to hack
healthcare organizations, compared to an average of 6,500 in the first
nine months, say researchers. Read the full article. [Infosecurity]
[img_assist|nid=2926|title=|desc=|link=none|align=right|width=100|height=100]The recent attack on the PlayStation 3 hypervisor has gotten a tremendous amount of attention, but there has not been much in the way of detailed analysis of the actual exploit itself. However, a prominent cryptographer and security researcher has looked at the exploit and found that it is a cleverly implemented attack that is quite difficult to defend against.
[img_assist|nid=2904|title=|desc=|link=none|align=left|width=100|height=100]A new iteration of Zeus, a notorious password-stealing trojan, is victimizing users of AOL Instant Messenger (AIM), according to researchers. Read the full article. [Secure Computing]
[img_assist|nid=2897|title=|desc=|link=none|align=left|width=100|height=100]Popular technology site TechCrunch was hit by potty-mouth hackers late on Monday, leaving the site temporarily unavailable.
A notice on TechCrunch.com’s front page on Tuesday morning explains that “TechCrunch.com was compromised by a security exploit”. Read the full article. [The Register]
[img_assist|nid=2893|title=|desc=|link=none|align=right|width=100|height=100]Having mastered the art of poisoning search engine results for .com sites, attackers are now turning their attention to .edu sites, linking their keyword campaigns to educational institutions as a way of lending their malicious sites more credence in the eyes of Google.
[img_assist|nid=2854|title=|desc=|link=none|align=right|width=100|height=100]By Atif Mushtaq, FireEyeIt’s very rare that we researchers get
a chance to explore the inner workings of a botnet command and control
server. Detailed insight into the botnet server or command component
can give us valuable information about the motives of the botnet and
possibly the bad guys behind it. But granting access to these command
and control servers often depends on the will of the hosting providers.
So what happened in this case?
[img_assist|nid=2853|title=|desc=|link=none|align=left|width=100|height=100]Two of the seven directory authority servers that the Tor Project uses to run its anonymous browsing service have been compromised, along with a new server that the project uses to host metrics and graphs.