Fake Firefox downloads are still running rampant
It seems 'Firefox' is still a dangerous keyword that malware authors like to target.
View ArticleMcAfee writes about Operation Tovar, taking a swipe at CryptoLocker and...
Law enforcement and the private sector, including McAfee, cooperated to dismantle the Gameover Zeus and CryptoLocker infrastructure, albeit temporarily.
View ArticleMicrosoft Interflow
Microsoft announced the private preview of Microsoft Interflow, a platform for exchanging security and threat information between cybersecurity analysts and researchers.
View ArticleMicrosoft takes down No-IP for passive role with malware
Microsoft took to the offense this week against malware, specifically Bladabindi (NJrat) and Jenxcus (NJw0rm) family of malware. In their sights to try to shut down this malware was another U.S.-based...
View ArticleSymantec Endpoint Protection giving Trojan.Webkit!html false positive
Symantec Endpoint Protection is flagging files called sh165.htm from people's Temporary Internet Files as a Trojan.Webkit!html.
View ArticleSymantec report analyzes personal fitness trackers and security concerns
Symantec Security Response prepared a report on wearable fitness devices and found vulnerabilities with the devices and the model of data custodianship.
View ArticleInternet Explorer will block out-of-date Java and other ActiveX controls
With an update today, Internet Explorer will block out-of-date ActiveX controls in 30 days. Old versions of Java will be the first control that will be blocked with others joining in the future.
View ArticleSprint hijacking NXDomain errors to search-error.com
I took my Android phone off of wireless and tried to browse to the subdomain on the cell network using Chrome for Android. Instead of reaching the page I intended, I got redirected to...
View ArticleSymantec on ‘Shellshock’, the Bash Bug Vulnerability
Norton provided a write-up explaining on the Linux and Mac OS X vulnerability known as ‘Shellshock’ or the ‘Bash Bug’ works in an infographic and video.
View ArticleFree e-book: Surviving on a Diet of Poisoned Fruit: Reducing the National...
Published in July by the Center for a New American Security, Surviving on a Diet of Poisoned Fruit: Reducing the National Security Risks of America’s Cyber Dependencies by Richard J. Danzig describes...
View ArticleOctober is National Cyber Security Awareness Month
October is National Cyber Security Awareness Month, coordinated by the Department of Homeland Security.
View ArticleKeybase embraces social networks for cryptography
Keybase aims to help PKI by taking advantage of social networks, places where people are already pushing their identities.
View ArticleUsing CompTIA’s free IT Security Assessment Wizard
Last week, CompTIA announced a free-for-registered users IT Security Assessment Wizard in a press release. I decided to try it out and see if it would be of any value to evaluate my clients and...
View ArticleBook Review: Penetration Testing – A Hands-On Introduction to Hacking by...
Penetration Testing – A Hands-On Introduction to Hacking by Georgia Weidman is 528 pages long and was published by No Starch Press in June 2014. This book is a beginner’s guide to performing...
View ArticleAvast updates free Windows and Mac clients to 2015
Avast has pushed out an update for the free antivirus clients, updating them to a 2015 version of the popular antivirus.
View ArticleArchive.org launches The Malware Museum to preserve DOS viruses
The Malware Museum is a collection of malware programs, usually viruses, that were distributed in the 1980s and 1990s on home computers. Once they infected a system, they would sometimes show animation...
View ArticlePwn2Own gets revamped for 2016
Last Fall, TippingPoint was acquired by Trend Micro from Hewlett-Packard. As a major sponsor, this brought into question if Pwn2Own would continue. More details have been revealed to confirm that...
View ArticleAV-Test announces 2015 antivirus product awards
AV-Test, an independent institute that evaluates antivirus products, has awarded their 2015 best product awards. Twelve awards were presented across different categories such as Protection,...
View ArticleMalwarebytes refreshes logo, website and introduces Breach Remediation service
Malwarebytes has introduced a new logo for the company and also gave malwarebytes.org a redesign at the same time. The new logo makes the ‘M’ a single color, removes the shadowing, and reduces the...
View ArticleDell Security publishes 2016 Annual Threat Report
Dell Security published their Annual Threat Report. It looks back on cybercrime trends of 2015 and emerging risks for 2016. The report uses data collected by SonicWALL’s GRID network with feeds from...
View Article