Security

SecurityTrendMicro

The Aurora Power Grid Vulnerability and the BlackEnergy Trojan

Credit to Author: William “Bill” Malik (CISA VP Infrastructure Strategies)| Date: Thu, 12 Jul 2018 13:10:42 +0000

At recent Industrial IoT security briefings, the Aurora vulnerability has come up repeatedly. Attendees ask, “Is our country’s power grid safe? How can we protect the grid? What is Aurora?” This post provides a look at Aurora, and the BlackEnergy attack that can exploit Aurora. In March 2007, the US Department of Energy demonstrated the…

The post The Aurora Power Grid Vulnerability and the BlackEnergy Trojan appeared first on .

Read More
MalwareBytesSecurity

We block shady ad blockers

Credit to Author: Malwarebytes Labs| Date: Wed, 11 Jul 2018 18:15:23 +0000

Some of you have reached out to us concerning Malwarebytes blocking of certain Ad blocking extensions, or an influx in web blocking notifications.  First things first, this is not a False Positive. 

Categories:

Tags:

(Read more…)

The post We block shady ad blockers appeared first on Malwarebytes Labs.

Read More
MicrosoftSecurity

Hawkeye Keylogger – Reborn v8: An in-depth campaign analysis

Credit to Author: Windows Defender ATP| Date: Wed, 11 Jul 2018 18:50:14 +0000

Much of cybercrime today is fueled by underground markets where malware and cybercriminal services are available for purchase. These markets in the deep web commoditize malware operations. Even novice cybercriminals can buy malware toolkits and other services they might need for malware campaigns: encryption, hosting, antimalware evasion, spamming, and many others. Hawkeye Keylogger (also known

Read more

Read More
MalwareBytesSecurity

IoT domestic abuse: What can we do to stop it?

Credit to Author: Christopher Boyd| Date: Wed, 11 Jul 2018 15:00:00 +0000

A disturbing new use of technology against loved ones has come to light: Internet of Things (IoT) domestic abuse cases are being reported, and security experts are wondering how best to tackle this new problem. What is it? And more importantly, what can we do to fight it?

Categories:

Tags:

(Read more…)

The post IoT domestic abuse: What can we do to stop it? appeared first on Malwarebytes Labs.

Read More