Month: May 2017

SecurityTrendMicro

OAuth Phishing On The Rise

Credit to Author: Mark Nunnikhoven (Vice President, Cloud Research)| Date: Wed, 03 May 2017 22:59:29 +0000

Recently there was a significant volume of new phishing emails aimed at capturing access to Google accounts…specifically your email and contacts. You can read more about it at The Verge, Quartz, and Ars Technica. This phish is a great—evil !?!—example of a sophisticated attempt to gain access to a large number of users accounts. In…

Read More
MalwareBytesSecurity

Google Docs App spam goes phishing

Credit to Author: Christopher Boyd| Date: Wed, 03 May 2017 19:51:53 +0000

There’s a very clever phishing scam going around at the moment involving Google Docs App. Originally thought to be targeting journalists given the sheer number of them mentioning it on their Twitter feeds, it’s also been slinging its way across unrelated mailboxes – from orgs to schools/campuses.

Categories:

Tags:

(Read more…)

The post Google Docs App spam goes phishing appeared first on Malwarebytes Labs.

Read More
FortinetSecurity

Deep Analysis of New Emotet Variant

Credit to Author: Xiaopeng Zhang| Date: Wed, 03 May 2017 10:50:33 -0700

Background Last week, FortiGuard Labs captured a JS file that functions as a malware downloader to spread a new variant of the Emotet Trojan. Its original file name is Invoice__779__Apr___25___2017___lang___gb___GB779.js.  A JS file, as you may be aware, is a JavaScript file that can be executed by a Window Script Host (wscript.exe) simply by double-clicking on it. In this blog we will analyze how this new malware works by walking through it step by step in chronological order. A JS file used to spread malware The original JS code…

Read More
ComputerWorldIndependent

Face it: Enterprise cyberattacks are going to happen

Credit to Author: Matt Hamblen| Date: Wed, 03 May 2017 11:00:00 -0700

There are now so many cyberattacks that many enterprises simply accept that hackers and bad actors will find ways to break into their systems.

A strategy some large businesses have developed over the past two years has been to quickly identify and isolate these attacks, possibly by shutting down part of a system or network so the hackers won’t get days or weeks to root around and grab sensitive corporate data.

This enterprise focus on rapid detection and response to various attacks on networks and computers doesn’t replace conventional security tools to prevent attacks. Instead, businesses are relying on both prevention software and detection software.

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

NSA collected 151 million records of Americans' calls, allowed 1,934 to be 'unmasked'

Credit to Author: Darlene Storm| Date: Wed, 03 May 2017 07:15:00 -0700

Despite the USA Freedom Act of 2015, the NSA collected 151 million records of Americans’ phone calls last year, even though it had obtained warrants from the FISA court to spy on only 42 people suspected of having ties to terrorism. The NSA also complied with requests from government officials to reveal the identities of 1,934 U.S. persons ensnared in the foreign surveillance.

The annual report, issued by the Office of the Director of National Intelligence, provides the first assessment of the effectiveness of the 2015 USA Freedom Act which was meant to limit dragnet surveillance of millions of Americans’ phone records. In 2016, 151,230,968 was the total estimated number of Americans’ call details records, meaning metadata about calls such as the number of the caller and recipient as well as the duration and time of the call, which the NSA received from providers and then stored in NSA repositories.

To read this article in full or to leave a comment, please click here

Read More