Month: May 2017

SecuritySophos

Android assediato dal malware – ecco come proteggere il vostro smartphone

Credit to Author: Sophos Italia| Date: Tue, 11 Apr 2017 06:01:05 +0000

Android assediato dal malware – ecco come proteggere il vostro smartphone Il SophosLabs Malware Forecast 2017 ha segnalato che le infezioni su smartphone stanno balzando alle stelle, in particolar modo per quanto riguarda i dispositivi Android. L&#8217;ultimo rapporto sulle minacce di Nokia conferma tale valutazione, mostrando come il malware mobile si sia diffuso più velocemente [&#8230;]<img alt=”” border=”0″ src=”https://pixel.wp.com/b.gif?host=news.sophos.com&#038;blog=834173&#038;post=2248&#038;subd=sophos&#038;ref=&#038;feed=1″ width=”1″ height=”1″ /><img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/UXnoG2yuWgs” height=”1″ width=”1″ alt=””/>

Read More
SecuritySophos

Spam is back: attenzione alla truffa pump-and-dump

Credit to Author: Tiziana Carboni| Date: Fri, 07 Apr 2017 05:49:36 +0000

Spam is back: attenzione alla truffa pump-and-dump Come segnalato dagli esperti Sophos in questo post, ad inizio 2017 è stato registrato un anomalo calo dello spam che si spiega con il fatto che una delle botnet da sempre più attive sembrava essere andata in letargo. Tuttavia, tale botnet non era affatto stata debellata e la [&#8230;]<img alt=”” border=”0″ src=”https://pixel.wp.com/b.gif?host=news.sophos.com&#038;blog=834173&#038;post=2241&#038;subd=sophos&#038;ref=&#038;feed=1″ width=”1″ height=”1″ /><img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/6xmF0v-di3g” height=”1″ width=”1″ alt=””/>

Read More
SecuritySophos

Best Practice e maggiori livelli di sicurezza per proteggere le strutture sanitarie

Credit to Author: Sophos Italia| Date: Thu, 06 Apr 2017 05:54:23 +0000

Best Practice e maggiori livelli di sicurezza per proteggere le strutture sanitarie Si fanno sempre più numerose le notizie che riportano di incidenti alla sicurezza all’interno di strutture sanitarie. Secondo i dati presentati recentemente dal Clusit, nei primi sei mesi del 2016 gli attacchi criminali al settore sanitario sono cresciuti del 144% rispetto al semestre [&#8230;]<img alt=”” border=”0″ src=”https://pixel.wp.com/b.gif?host=news.sophos.com&#038;blog=834173&#038;post=2236&#038;subd=sophos&#038;ref=&#038;feed=1″ width=”1″ height=”1″ /><img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/DeFzF4E8zEQ” height=”1″ width=”1″ alt=””/>

Read More
FortinetSecurity

Spring Parade for Refreshed Android Marcher

Credit to Author: Dario Durando, Kenny Yang, David Maciejak| Date: Wed, 17 May 2017 21:14:16 -0700

Android malware continues to grow exponentially now that it has overtaken the top position as the most popular OS (across all platforms), making it the target of choice for malware authors. Android Marcher is an Android banker malware that has been on the FortiGuard Labs radar since late 2013. Since that time it has been seen in a number of campaigns targeting many different banks and countries. And now, Marcher has once again resurfaced with a new campaign. Over the past few months we have observed it masking itself in a variety of ways…

Read More
FortinetSecurity

New Loki Variant Being Spread via PDF File

Credit to Author: Xiaopeng Zhang and Hua Liu| Date: Wed, 17 May 2017 18:24:02 -0700

The Loki Bot has been observed for years. As you may know, it is designed to steal credentials from installed software on a victim’s machine, such as email clients, browsers, FTP clients, file management clients, and so on. FortiGuard Labs recently captured a PDF sample that is used to spread a new Loki variant. In this blog, we will analyze how this new variant works and what it steals. The PDF sample Figure 1. Content of the PDF sample The PDF sample only contains one page, shown above, which includes some…

Read More
ComputerWorldIndependent

IDG Contributor Network: FTC to crack down on bogus ‘tech support’ lines

Credit to Author: Andy Patrizio| Date: Wed, 17 May 2017 11:30:00 -0700

In an extremely fortunate bit of timing, I visited my parents just as my father nearly fell for one of the worst scams floating around on the Internet. He had inadvertently clicked on a bogus link that popped up an equally bogus blue screen claiming his computer had been compromised and he needed to call a toll free “Microsoft” support line to get help.

Of course it wasn’t Microsoft and the pop up was fraudulent, but he didn’t know that. I practically screamed “hang up!” at him and explained why after he did.

These tech support scams have always been growing in frequency and severity, and the fact that they have an 800 number (or some derivative) not only gives them validity and makes people more willing to call, but also shows they are flying under the radar and using legitimate means against their victims.

To read this article in full or to leave a comment, please click here

Read More
SecuritySophos

See WannaCry ransomware in action

Credit to Author: Bill Brenner| Date: Wed, 17 May 2017 18:03:23 +0000

We break down the process of the WannaCry ransomware outbreak, including how it spread and demo how Sophos Intercept X protects against it.<img alt=”” border=”0″ src=”https://pixel.wp.com/b.gif?host=news.sophos.com&#038;blog=834173&#038;post=34342&#038;subd=sophos&#038;ref=&#038;feed=1″ width=”1″ height=”1″ /><img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/jqJ-6ruYsmU” height=”1″ width=”1″ alt=””/>

Read More
FortinetSecurity

WannaCry FAQ – Take-aways and Learnings

Credit to Author: Aamir Lakhani| Date: Wed, 17 May 2017 10:58:45 -0700

WannaCry FAQ: How does WannaCry spread? WannaCry has multiple ways of spreading. Its primary method is to use the Backdoor.Double.Pulsar backdoor exploit tool released last March by the hacker group known as Shadow Brokers, and managed to infect thousands of Microsoft Windows computers in only a few weeks. Because DoublePulsar runs in kernel mode, it grants hackers a high level of control over the compromised computer system.

Read More