Thursday, April 30th, 2015
Macro malware, that tried-and-true document-borne attack vector, is back. Over the past few months, Microsoft has seen an increasing macro downloader trend that affects nearly 501,240 unique machines worldwide.
The majority of the macro-malware attacks have taken place in the United States and United Kingdom.
Macro malware gets into your ...
Posted in Internet, Security, Windows | No Comments
Wednesday, April 29th, 2015
Phishing pages are tricky by nature: they look like standard login pages, but are actually faux sites run by people looking to receive and steal passwords. Google is taking steps to thwart this common and dangerous trap with its Password Alert service.
Password Alert is an open-source Chrome extension that ...
Posted in Internet, Privacy, Security | No Comments
Tuesday, April 21st, 2015
Since the discovery of the Poweliks fileless Trojan in August 2014, researchers have been expecting other similar malware to pop up.
The wait is over: Phasebot malware, which also has fileless infection as part of its routine, is being sold online.
"Unlike most malware, fileless malware hides itself in locations that are ...
Posted in Internet, Security | No Comments
Monday, April 13th, 2015
Researchers with Cylance have identified a new attack technique – built on a vulnerability identified nearly 20 years ago by Aaron Spangler – that can enable the theft of user credentials from PCs, tablets and servers running any version of Windows, according to a Monday post by Cylance.
The “Redirect to ...
Posted in Internet, Security | No Comments
Tuesday, April 7th, 2015
A long-awaited code review of encryption service Truecrypt has finally been completed, with the good news being that there are no deliberate backdoors in the “relatively well-designed” piece of software.
Cryptographic expert Matthew Green revealed the news in a blog post last week, claiming that the NCC Crypto Services group had found “no ...
Posted in Internet, Privacy, Security | No Comments