Security

QuickHealSecurity

Beware! The TrickBot Trojan is back

Credit to Author: Quick Heal Security Labs| Date: Fri, 16 Jun 2017 14:45:22 +0000

TrickBot Trojan was first identified in mid-2016 and considered similar to the Dyreza banking Trojan. Initially, the payload (the component of a computer virus that executes a malicious activity) was spreading through a malvertising campaign using the Rig Exploit Kit. From our current findings, we have found that TrickBot has…

The post Beware! The TrickBot Trojan is back appeared first on Quick Heal Technologies Security Blog | Latest computer security news, tips, and advice.

Read More
SecurityTrendMicro

TippingPoint Threat Intelligence and Zero-Day Coverage – Week of June 12, 2017

Credit to Author: Cara West-Wainwright| Date: Fri, 16 Jun 2017 12:00:40 +0000

“What can you sit on, sleep on, and brush your teeth with?” This was the question posed to Steve Martin’s character C.D. Bales in the 1987 movie Roxanne. In a modern take of Edmond Rostand’s 1897 verse play Cyrano de Bergerac, the movie centers around C.D.’s attempt to win the love of a woman while…

Read More
ComputerWorldIndependent

The price of security is eternal phone calls

Credit to Author: Sharky| Date: Fri, 16 Jun 2017 03:00:00 -0700

This city government is going through an extended validation process with one of its IT security providers, according to a pilot fish in the loop.

“I got an email that said to call them, since they couldn’t reach me at the number they had,” fish says. “That’s no surprise, because the number isn’t mine — it’s our Human Resources main line.

“I’ve told them in the past to call me at my actual number for this, but they always insist that they need a ‘published’ number.”

After yet another round of this for the new security certification, fish calls customer support for the security outfit and suggests they replace the HR number with the number for the city’s IT department. That’s on the city’s official website, so it should qualify as “published.”

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

Rogue cell phone surveillance gives rise to mobile threat defense

Credit to Author: Lucas Mearian| Date: Thu, 15 Jun 2017 03:01:00 -0700

Researchers have created a device using off-the-shelf components that can sniff out controversial cell phone surveillance devices, known as IMSI-catchers or StingRays, used by federal and state law enforcement as well as hackers.

The International Mobile Subscriber Identity-catchers have not only been used to locate mobile devices but also to sometimes eavesdrop on users, send spam or upload malware, according to University of Washington (UW) security researchers.

“The threats remain the same when looking at enterprises: tracking and, under certain circumstances, eavesdropping are possible through this attack,” said Dionisio Zumerle, a Gartner research director for Mobile Security. “The attack requires technical expertise and equipment that was once hard to find; today it is easier and that is the main source of concern.”

To read this article in full or to leave a comment, please click here

Read More