Tuesday, April 21st, 2015
Since the discovery of the Poweliks fileless Trojan in August 2014, researchers have been expecting other similar malware to pop up.
The wait is over: Phasebot malware, which also has fileless infection as part of its routine, is being sold online.
"Unlike most malware, fileless malware hides itself in locations that are ...
Posted in Internet, Security | No Comments
Monday, April 13th, 2015
Researchers with Cylance have identified a new attack technique – built on a vulnerability identified nearly 20 years ago by Aaron Spangler – that can enable the theft of user credentials from PCs, tablets and servers running any version of Windows, according to a Monday post by Cylance.
The “Redirect to ...
Posted in Internet, Security | No Comments
Tuesday, April 7th, 2015
A long-awaited code review of encryption service Truecrypt has finally been completed, with the good news being that there are no deliberate backdoors in the “relatively well-designed” piece of software.
Cryptographic expert Matthew Green revealed the news in a blog post last week, claiming that the NCC Crypto Services group had found “no ...
Posted in Internet, Privacy, Security | No Comments
Tuesday, April 7th, 2015
Trend Micro researchers have found and analyzed a new piece of crypto-ransomware: CryptVault encrypts files, makes them look like files quarantined by an AV solution, asks for ransom and, finally, downloads info-stealer malware.
It arrives on target computers after the user has been tricked into downloading and running a malicious attachment ...
Posted in Internet, Privacy, Security | No Comments
Thursday, March 26th, 2015
Of all the various malware attack vectors, hacking a person’s router is one of the most effective. A new report from Ara Labs highlights how router attacks have evolved in recent years, and details a new method of serving unwanted advertising via intercepted Google Analytics information.
When evil routers attack
The reason ...
Posted in Hardware, Internet, Networking | No Comments