Monday, April 7th, 2014
The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library. This weakness allows stealing the information protected, under normal conditions, by the SSL/TLS encryption used to secure the Internet. SSL/TLS provides communication security and privacy over the Internet for applications such as web, email, instant messaging ...
Posted in Internet, Networking, Privacy, Security | No Comments
Friday, April 4th, 2014
A recently discovered variant of the Zeus banking Trojan was found to use a legitimate digital signature to avoid detection from Web browsers and anti-virus systems.
Security vendor Comodo reported Thursday finding the variant 200 times while monitoring and analyzing data from users of its Internet security system. The variant includes ...
Posted in Internet, Security, Windows | No Comments
Thursday, April 3rd, 2014
Tens of millions of the home routers we rely on everyday for internet access are enabling Domain Name System (DNS) based distributed denial-of-service (DDoS) attacks, and owners may never even know it, according to research by DNS software provider Nominum.
Working collaboratively with the Open Resolver Project, Nominum learned that open ...
Posted in Hardware, Internet, Networking, Privacy, Security | No Comments
Tuesday, April 1st, 2014
Hackers posted names, e-mail addresses, message histories, and partially protected login credentials for more than 158,000 forum users of Boxee.tv, the Web-based television service that was acquired by Samsung last year, researchers said.
The breach occurred no later than last week, when a full copy of the purloined forum data became widely ...
Posted in Internet, Privacy, Security | No Comments
Thursday, March 27th, 2014
Malware targeting Word and Excel files has been around for some time, but we recently encountered a new malware family, CRIGENT (also known as “Power Worm”) which brings several new techniques to the table. (We detect these files as W97M_CRIGENT.JER and X97M_CRIGENT.A.)
Most significantly, instead of creating or including executable code, CRIGENT uses the ...
Posted in Internet, Security, Windows | No Comments