Trojan Horses


IRS Phishing Scam Targets Corporations

[img_assist|nid=3167|title=|desc=|link=none|align=right|width=100|height=100]Fake emails claiming to be from the IRS are a variation of the usual IRS phishing expeditions that
typically target end users during tax time, but this campaign aims
to infect organizational machines through corporate rather than
personal email. Read the full article. [Infosecurity]

Anonymous Hacker Exposes Voice Encryption Flaws

[img_assist|nid=2979|title=|desc=|link=none|align=left|width=100|height=100]A vast majority of voice encryption products are seriously flawed, according to controversial tests by an anonymous hacker.

Using the commercially available FlexiSpy wiretapping utility and a
‘homemade’ Trojan, Notrax (the anonymous hacker’s nickname) claims to
have defeated 11 out of 15 voice encryption technologies in tests. Read the full article. [The Register]

Tracking The Destructive Worm Zimuse

[img_assist|nid=2870|title=|desc=|link=none|align=left|width=100|height=100]Zimuse-A and its variant, Zimuse-B, overwrite MBR (Master Boot Record)
files on infected drives with their own data, either 40 days or 20 days
respectively after infection. This malicious behavior corrupts records
and makes data recovery difficult if not impossible, researchers report. Read the full article. [The Register]


Subscribe to our newsletter, Threatpost Today!

Get the latest breaking news delivered daily to your inbox.