A week in security (December 30 – January 5)

Credit to Author: Malwarebytes Labs| Date: Mon, 06 Jan 2020 17:20:25 +0000

A roundup of the previous week’s most notable security stories and events, including new web skimmer techniques, an explanation of edge computing, and more.

Categories:

Tags:

(Read more…)

The post A week in security (December 30 – January 5) appeared first on Malwarebytes Labs.

Read more

7 types of virus – a short glossary of contemporary cyberbadness

Credit to Author: Paul Ducklin| Date: Sat, 28 Dec 2019 21:30:37 +0000

Here’s a short list of 7 malware categories we hope you never encounter. Sadly, it’s not an exhaustive list… but it’s a helpful start.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/pb59riwiap0″ height=”1″ width=”1″ alt=””/>

Read more

Sextortionists return for Christmas – price goes down, threats go up

Credit to Author: Paul Ducklin| Date: Tue, 24 Dec 2019 15:30:02 +0000

This follow-up sextortion demand, timed to align with Christmas, has a much more aggressive and menacing tone that last week’s version.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/9oxseBcWbcM” height=”1″ width=”1″ alt=””/>

Read more

Gozi V3: tracked by their own stealth

Credit to Author: sophoslabsbehavioural| Date: Tue, 24 Dec 2019 09:00:32 +0000

Gozi, also known as Ursnif or ISFB, is a banking trojan which has been around for a long time and currently multiple variations of the trojan are circulating after its source code got leaked. Every variant that is distributed has interesting aspects, with Gozi version 3 the most eye-catching in the field of detection evasion. [&#8230;]<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/LaetYrage7Q” height=”1″ width=”1″ alt=””/>

Read more

Hiding malware downloads in Taylor Swift pics! New SophosLabs report

Credit to Author: Paul Ducklin| Date: Thu, 19 Dec 2019 16:03:43 +0000

Just because a malware family isn’t all over the headlines doesn’t mean it isn’t interesting… or important… or dangerous!<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/Axkezd1BhWc” height=”1″ width=”1″ alt=””/>

Read more

Get in line! 38,000 students and staff forced to queue for new passwords

Credit to Author: Lisa Vaas| Date: Thu, 19 Dec 2019 11:25:53 +0000

It’s not a bread line, and it’s not a line to see Santa – it’s an analog response to a nasty cyber attack.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/Iubgv-x9nTA” height=”1″ width=”1″ alt=””/>

Read more

Ransomware-seized New Orleans declares state of emergency

Credit to Author: Lisa Vaas| Date: Tue, 17 Dec 2019 12:14:47 +0000

There are signs that the attackers used the particularly pernicious Ryuk strain of ransomware.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/_IFQ_O3lT1A” height=”1″ width=”1″ alt=””/>

Read more

The usual suspects

Credit to Author: Sharky| Date: Fri, 13 Dec 2019 03:00:00 -0800

One morning Wilma, the print shop manager at a beer distributor, discovers that her computer has a virus. It’s no big deal — sometimes bad things happen to good computers — so she cleans up the system and gets on with her day.

But a few days later the system is infected again.

Considerably more annoyed this time, she contacts Betty (the company’s sole IT person) to get some assistance and make sure the system is 100% clean. After disinfecting the system, Betty checks the browser history and finds that someone has been making late-night visits to X-rated websites.

The question then becomes, Who is using company resources to watch porn? At most companies, suspicion would immediately fall on the nighttime cleaning crew. But the print shop is located in the warehouse, to which the cleaning crew doesn’t have access.

To read this article in full, please click here

Read more