Saturday, August 30, 2014

CryptoWall’s Haul: $1M in Six Months Secure Hunter

The CryptoWall ransomware has proven to be a profitable criminal enterprise, netting more than $ 1.1 million in six months. More than 1,600 victims have surfaced and more than 5 billion files have been encrypted.

Threatpost – English – Global – threatpost.com » Malware

Secure Hunter Anti -Malware



The post CryptoWall’s Haul: $1M in Six Months Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1wS8xbj

Secure Hunter

Thursday, August 28, 2014

Windows XP-Heavy Turkey Overrun with GameOver Zeus Infections Secure Hunter

GameOver Zeus and Sality banking malware infections are rampant in emerging countries such as Turkey where older, unpatched computers are prevalent, and security awareness is low.

Threatpost – English – Global – threatpost.com » Malware

Secure Hunter Anti -Malware



The post Windows XP-Heavy Turkey Overrun with GameOver Zeus Infections Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1wHQ5BZ

Secure Hunter

Tuesday, August 26, 2014

Monday, August 25, 2014

Secret Service Warns 1,000 Businesses Hit by Backoff PoS Malware Secure Hunter

DHS and the Secret Service warned businesses to be proactive about scanning for point-of-sale malware, especially Backoff, which has hit more than 1,000 businesses already.

Threatpost – English – Global – threatpost.com » Malware

Secure Hunter Anti -Malware



The post Secret Service Warns 1,000 Businesses Hit by Backoff PoS Malware Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1vHXCMV

Secure Hunter

Attack targets auto industry firms in Europe Secure Hunter

Cybercriminals are using a new information-stealing malware program to target companies from the automobile industry in Europe, security researchers warned.

Computerworld Malware and Vulnerabilities News

Secure Hunter Anti -Malware



The post Attack targets auto industry firms in Europe Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1tNux1m

Secure Hunter

How to protect yourself online with privacy settings

Shadow cloud services pose a growing risk to enterprises Secure Hunter

A growing tendency by business units and workgroups to sign up for cloud services without asking their IT organization creates serious risks for enterprises.

Computerworld Malware and Vulnerabilities News

Secure Hunter Anti -Malware



The post Shadow cloud services pose a growing risk to enterprises Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1mI9dX1

Secure Hunter

Friday, August 22, 2014

US warns 'significant number' of major businesses hit by Backoff malware Secure Hunter

More than 1,000 major enterprise networks and small and medium businesses in the U.S. have been compromised by a recently discovered malware package called "Backoff" and are probably unaware of it, the U.S. Department of Homeland Security (DHS) said in a cybersecurity alert on Friday.

Computerworld Malware and Vulnerabilities News

Secure Hunter Anti -Malware



The post US warns 'significant number' of major businesses hit by Backoff malware Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1v6QrAo

Secure Hunter

Microsoft engineer: ‘Definitely problems’ with test process after crippling Windows patch Secure Hunter

A week after Microsoft pulled a Patch Tuesday update that crippled some Windows 7 PCs, the company has yet to provide a working fix for either the original flaw or the resulting problem.

Computerworld Malware and Vulnerabilities News

Secure Hunter Anti -Malware



The post Microsoft engineer: ‘Definitely problems’ with test process after crippling Windows patch Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1niHj3E

Secure Hunter

Wednesday, August 20, 2014

UPS now the third company in a week to disclose data breach Secure Hunter

Credit and debit card information belonging to customers who did business at 51 UPS Store Inc. locations in 24 U.S. states this year may have been compromised.

Computerworld Malware and Vulnerabilities News

Secure Hunter Anti -Malware



The post UPS now the third company in a week to disclose data breach Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1pMMldA

Secure Hunter

A New Spin on Rogue Antivirus Secure Hunter

Rogue antivirus malware is on the decline, but a new, simpler version of that threat that simply redirects users to the site of a fake malware protection service has been infecting users around the world.

Threatpost – English – Global – threatpost.com » Malware

Secure Hunter Anti -Malware



The post A New Spin on Rogue Antivirus Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/XBxQPj

Secure Hunter

‘Reveton’ransomware adds powerful password stealer Secure Hunter

A type of malware called Reveton, which falsely warns users they’ve broken the law and demands payment of a fine, has been upgraded with powerful password stealing functions, according to Avast.

Computerworld Malware and Vulnerabilities News

Secure Hunter Anti -Malware



The post ‘Reveton’ransomware adds powerful password stealer Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1oR9FYr

Secure Hunter

Tuesday, August 19, 2014

APT Gang Branches Out to Medical Espionage in Community Health Breach Secure Hunter

The Community Health Systems data breach has been tied to a Chinese APT gang that has branched out to medical espionage, stealing patient data in an effort to target intelligence on medical device development.

Threatpost – English – Global – threatpost.com » Malware

Secure Hunter Anti -Malware



The post APT Gang Branches Out to Medical Espionage in Community Health Breach Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1sTcauO

Secure Hunter

Kicking the stool out from under the cybercrime economy Secure Hunter

Put simply, cybercrime, especially financial malware, has the potential to be quite the lucrative affair. That's only because the bad guys have the tools to make their work quick and easy, though. Cripple the automated processes presented by certain malware platforms, and suddenly the threats — and the losses –aren't quite so serious.

Computerworld Malware and Vulnerabilities News

Secure Hunter Anti -Malware



The post Kicking the stool out from under the cybercrime economy Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1veuD30

Secure Hunter

New Attack Binds Malware in Parallel to Software Downloads Secure Hunter

Open source software distribution systems that lack security processes and integrity checks are prone to a new attack that binds malware to a download without modifying the original application.

Threatpost – English – Global – threatpost.com » Malware

Secure Hunter Anti -Malware



The post New Attack Binds Malware in Parallel to Software Downloads Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1pHEaPH

Secure Hunter

Monday, August 18, 2014

Pro-Syrian Malware Increasing in Number, Complexity Secure Hunter

Malware deployed against activists in Syria is increasing as the groups deploying these remote access tools become more sophisticated and utilize more complex tactics.

Threatpost – English – Global – threatpost.com » Malware

Secure Hunter Anti -Malware



The post Pro-Syrian Malware Increasing in Number, Complexity Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1valRD4

Secure Hunter

Update: Microsoft pulls crippling patch from Windows Update Secure Hunter

Although Microsoft has pulled a patch from Windows Update that crippled some computers, it is still pushing a truncated version of the security update that contained the flawed fix.

Computerworld Malware and Vulnerabilities News

Secure Hunter Anti -Malware



The post Update: Microsoft pulls crippling patch from Windows Update Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1o5yEkG

Secure Hunter

Sunday, August 17, 2014

Microsoft urges customers to uninstall ‘Blue Screen of Death’ update Secure Hunter

Microsoft is quietly recommending that customers uninstall one of last week’s security updates after users reported that it crippled their computers with the infamous “Blue Screen of Death.”

Computerworld Malware and Vulnerabilities News

Secure Hunter Anti -Malware



The post Microsoft urges customers to uninstall ‘Blue Screen of Death’ update Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/VwNE4f

Secure Hunter

Friday, August 15, 2014

Heartbleed software flaw exposes weaknesses in hardware design Secure Hunter

Heartbleed may have been a software bug, but it highlighted glaring weaknesses in existing hardware architectures, which remain vulnerable to memory-bound attacks, a university researcher said this week.

Computerworld Malware and Vulnerabilities News

Secure Hunter Anti -Malware



The post Heartbleed software flaw exposes weaknesses in hardware design Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1m48dMv

Secure Hunter

Cridex Malware Takes Lesson From GameOver Zeus Secure Hunter

Researchers have now identified a new variant of the Cridex malware that has adopted some of the techniques that made GOZ so successful in its day.

Threatpost – English – Global – threatpost.com » Malware

Secure Hunter Anti -Malware



The post Cridex Malware Takes Lesson From GameOver Zeus Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1l9mNHz

Secure Hunter

Grocery stores in multiple states hit by data breach Secure Hunter

A data breach at Supervalu Inc., one of the largest grocery wholesalers and retailers in the U.S., could affect thousands of people who shopped at the company’s stores in June and July.

Computerworld Malware and Vulnerabilities News

Secure Hunter Anti -Malware



The post Grocery stores in multiple states hit by data breach Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1AkDlzy

Secure Hunter

Malware no longer avoids virtual machines Secure Hunter

Many malicious software programs used to make a quick exit on virtual machines, a tactic designed to avoid a security check. But that isn’t the case anymore, according Symantec research.

Computerworld Malware and Vulnerabilities News

Secure Hunter Anti -Malware



The post Malware no longer avoids virtual machines Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1t32TwY

Secure Hunter

Google Adds Warnings About Deceptive Software to Safe Browsing Service Secure Hunter

The Google Safe Browsing service has become an integral part of most of the major browsers, integrating malware alerts, warnings about malicious Web sites and suspicious content. The company has been expanding the capabilities of the service steadily over the last few years, and now Google is adding warnings about deceptive software to the service. […]

Threatpost – English – Global – threatpost.com » Malware

Secure Hunter Anti -Malware



The post Google Adds Warnings About Deceptive Software to Safe Browsing Service Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1pggrW1

Secure Hunter

Thursday, August 14, 2014

Users told to patch critical flaw in Adobe Reader and Acrobat Secure Hunter

Adobe Systems has released security patches for its Flash Player, Reader and Acrobat products, addressing a total of eight vulnerabilities, including one that is being exploited by attackers.

Computerworld Malware and Vulnerabilities News

Secure Hunter Anti -Malware



The post Users told to patch critical flaw in Adobe Reader and Acrobat Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1oU4x4P

Secure Hunter

Gameover Zeus Botnet Rebuilds Secure Hunter

Research from Arbor Networks points to a rejuvenated GameOver Zeus botnet that has grown more than 1,800 percent, confirming it has been rebuilt from scratch.

Threatpost – English – Global – threatpost.com » Malware

Secure Hunter Anti -Malware



The post Gameover Zeus Botnet Rebuilds Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1uV1tpB

Secure Hunter

Google broadens its malware sleuthing to sniff out deceptive downloads Secure Hunter

Google is expanding its safe browsing technology to notify Web users of downloads that appear benign, but actually make unwanted changes to their computers.

Computerworld Malware and Vulnerabilities News

Secure Hunter Anti -Malware



The post Google broadens its malware sleuthing to sniff out deceptive downloads Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1uUAYAr

Secure Hunter

The biggest iPhone security risk could be connecting one to a computer Secure Hunter

Apple has done well to insulate its iOS mobile operating system from many security issues, but a forthcoming demonstration shows it's far from perfect.

Computerworld Malware and Vulnerabilities News

Secure Hunter Anti -Malware



The post The biggest iPhone security risk could be connecting one to a computer Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1t35BDu

Secure Hunter

Google Tweaks Gmail to Help Limit Spam Secure Hunter

Google is making a small, but potentially important, change to the way that Gmail handles some special characters in messages as a way to defeat a common tactic used by spammers to confuse recipients and trick them into opening emails.

Threatpost – English – Global – threatpost.com » Malware

Secure Hunter Anti -Malware



The post Google Tweaks Gmail to Help Limit Spam Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1l6lRDO

Secure Hunter

Wednesday, August 13, 2014

Snowden reveals automated NSA cyberwarfare program Secure Hunter

The U.S. National Security Agency has a cyberwarfare program that hunts for foreign cyberattacks and is able to strike back without human intervention, according to NSA leaker Edward Snowden.

Computerworld Malware and Vulnerabilities News

Secure Hunter Anti -Malware



The post Snowden reveals automated NSA cyberwarfare program Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1yyGzNb

Secure Hunter

Study Confirms Uyghur Remain in Crosshairs of Targeted Attacks Secure Hunter

A research paper to be delivered next week at USENIX takes a deep look into the reconnaissance nation-states undergo in order to craft email-based attacks against non-governmental organizations.

Threatpost – English – Global – threatpost.com » Malware

Secure Hunter Anti -Malware



The post Study Confirms Uyghur Remain in Crosshairs of Targeted Attacks Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/VnhTdm

Secure Hunter

BlackBerry patches vulnerabilities in BlackBerry OS, enterprise server software Secure Hunter

BlackBerry's focus on strong security as a key differentiator for its devices does not mean that they're completely free of flaws. The company released security updates Tuesday for both the OS running on its smartphones and for its enterprise server software.

Computerworld Malware and Vulnerabilities News

Secure Hunter Anti -Malware



The post BlackBerry patches vulnerabilities in BlackBerry OS, enterprise server software Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1AeNhdZ

Secure Hunter

BlackBerry patches vulnerabilities in BlackBerry OS, enterprise server software Secure Hunter

BlackBerry's focus on strong security as a key differentiator for its devices does not mean that they're completely free of flaws. The company released security updates Tuesday for both the OS running on its smartphones and for its enterprise server software.

Computerworld Malware and Vulnerabilities News

Secure Hunter Anti -Malware



The post BlackBerry patches vulnerabilities in BlackBerry OS, enterprise server software Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1AeNhdO

Secure Hunter

Users should patch critical flaw in Adobe Reader and Acrobat, researchers say Secure Hunter

Adobe Systems has released security patches for its Flash Player, Reader and Acrobat products, addressing a total of eight vulnerabilities, including one that is being exploited by attackers.

Computerworld Malware and Vulnerabilities News

Secure Hunter Anti -Malware



The post Users should patch critical flaw in Adobe Reader and Acrobat, researchers say Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/Vjin4J

Secure Hunter

Tuesday, August 12, 2014

15 new vulnerabilities reported during router hacking contest Secure Hunter

Routers appear to be as insecure as ever, after hackers successfully compromised five popular wireless models during a contest at the DefCon 22 security conference, reporting 15 new vulnerabilities to affected vendors.

Computerworld Malware and Vulnerabilities News

Secure Hunter Anti -Malware



The post 15 new vulnerabilities reported during router hacking contest Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/VkwhmR

Secure Hunter

Microsoft’s Patch Tuesday updates focus on Internet Explorer Secure Hunter

Microsoft has issued 29 patches for its Internet Explorer browser, including one fixing a critical vulnerability that would allow a remote attacker to gain access to a computer from over the Internet.

Computerworld Malware and Vulnerabilities News

Secure Hunter Anti -Malware



The post Microsoft’s Patch Tuesday updates focus on Internet Explorer Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1mH415l

Secure Hunter

Amazon protects its virtual desktops with two-factor authentication Secure Hunter

Amazon Web Services now lets enterprises use two-factor authentication to better protect hosted WorkSpaces virtual desktops.

Computerworld Malware and Vulnerabilities News

Secure Hunter Anti -Malware



The post Amazon protects its virtual desktops with two-factor authentication Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1q6yxqc

Secure Hunter

Monday, August 11, 2014

Move Over Web Security, Embedded Devices Are Darling of Black Hat Secure Hunter

Embedded device security emerged as front page news during the recently wrapped up Black Hat and DEF CON events.

Threatpost – English – Global – threatpost.com » Malware

Secure Hunter Anti -Malware



The post Move Over Web Security, Embedded Devices Are Darling of Black Hat Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1kxssXf

Secure Hunter

Mobile chips face lockdown to prevent hacks Secure Hunter

Chip makers want to make hardware the first layer of defense against data breaches and other attacks on tablets and smartphones.

Computerworld Malware and Vulnerabilities News

Secure Hunter Anti -Malware



The post Mobile chips face lockdown to prevent hacks Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1nJFRGY

Secure Hunter

Security Manager’s Journal: Peering behind the firewall Secure Hunter

The corporate firewall is like a dike keeping out a raging sea of malware. Where does it all come from?

Computerworld Malware and Vulnerabilities News

Secure Hunter Anti -Malware



The post Security Manager’s Journal: Peering behind the firewall Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1sufDzR

Secure Hunter

Sunday, August 10, 2014

Critical Android FakeID Bug Allows Attackers to Impersonate Trusted Apps Secure Hunter

There is a critical vulnerability in millions of Android devices that allows a malicious app to impersonate a trusted application in a transparent way.

Threatpost – English – Global – threatpost.com » Malware

Secure Hunter Anti -Malware



The post Critical Android FakeID Bug Allows Attackers to Impersonate Trusted Apps Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1kURBfa

Secure Hunter

Home routers supplied by ISPs can be compromised en masse Secure Hunter

Specialized servers used by many ISPs to manage routers and other gateway devices provisioned to their customers are accessible from the Internet and can easily be taken over by attackers, researchers warn.

Computerworld Malware and Vulnerabilities News

Secure Hunter Anti -Malware



The post Home routers supplied by ISPs can be compromised en masse Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/VaG0fH

Secure Hunter

Threat Intelligence Tool Connects Dots on Pre-Attack Data Secure Hunter

Georgia Tech Research Institute has released an open source threat intelligence gathering tool called BlackForest that automates attack-data mining.

Threatpost – English – Global – threatpost.com » Malware

Secure Hunter Anti -Malware



The post Threat Intelligence Tool Connects Dots on Pre-Attack Data Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1re5jHP

Secure Hunter

Saturday, August 9, 2014

Crouching Yeti APT Campaign Stretches Back Four Years Secure Hunter

A new analysis of a long-term APT campaign targeting manufacturers, industrial, pharmaceutical, construction and IT companies in several countries has uncovered fresh details of the attack, including identification of nearly 3,000 victims and the unmasking of the command-and-control infrastructure.

Threatpost – English – Global – threatpost.com » Malware

Secure Hunter Anti -Malware



The post Crouching Yeti APT Campaign Stretches Back Four Years Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1sznHfo

Secure Hunter

New GameOver Zeus Variant Generates 1,000 Domains Daily Secure Hunter

A new variant of the GameOver Zeus malware has been spotted with a new domain generation algorithm that now generates 1,000 new domains daily.

Threatpost – English – Global – threatpost.com » Malware

Secure Hunter Anti -Malware



The post New GameOver Zeus Variant Generates 1,000 Domains Daily Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1ou98KD

Secure Hunter

Friday, August 8, 2014

Google lowers search ranking of websites that don’t use encryption Secure Hunter

New Backoff PoS Malware Identified in Several Attacks Secure Hunter

A new breed of point-of-sale malware has been found in several recent attacks, and experts say that the tool, known as Backoff, has extensive data stealing and exfiltration capabilities, including keylogging, memory scraping and injection into running processes.

Threatpost – English – Global – threatpost.com » Malware

Secure Hunter Anti -Malware



The post New Backoff PoS Malware Identified in Several Attacks Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1vnHBiR

Secure Hunter

PCI Security Council moves to boost service providers’ credit card security Secure Hunter

The PCI Security Standards Council has updated its guidance to help merchants better determine whether third party service providers have implemented security measures to protect credit and debit cardholder data.

Computerworld Malware and Vulnerabilities News

Secure Hunter Anti -Malware



The post PCI Security Council moves to boost service providers’ credit card security Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1slIsyg

Secure Hunter

Some mobile POS devices still have critical flaws months after patch Secure Hunter

Security researchers demonstrated Thursday flaws that can allow hackers to take over mobile point-of-sale (mPOS) devices from different manufacturers by inserting rogue cards into them.

Computerworld Malware and Vulnerabilities News

Secure Hunter Anti -Malware



The post Some mobile POS devices still have critical flaws months after patch Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1ssdJMx

Secure Hunter

Epic Operation Kicks Off Multistage Turla APT Campaign Secure Hunter

Researchers at Kaspersky Lab have cracked the means by which the Turla APT campaign compromises its victims, using a precursor called Epic.

Threatpost – English – Global – threatpost.com » Malware

Secure Hunter Anti -Malware



The post Epic Operation Kicks Off Multistage Turla APT Campaign Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1u5HMh8

Secure Hunter

Thursday, August 7, 2014

Carriers’ remote control software still puts mobile devices at risk Secure Hunter

Vulnerabilities found in remote management software that carriers insist be installed on smart phones and other mobile-enabled devices they sell are likely to put many devices at risk of compromise for some time to come.

Computerworld Malware and Vulnerabilities News

Secure Hunter Anti -Malware



The post Carriers’ remote control software still puts mobile devices at risk Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/XL12TT

Secure Hunter

Behind the CryptoLocker Disruption Secure Hunter

LAS VEGAS–The takedown of the GameOver Zeus malware operation in June got more than its share of attention, but it was the concurrent demolition of the CryptoLocker ransomware infrastructure that may prove to have been the most important part of the operation. That outcome was the culmination of months of behind the scenes work by […]

Threatpost – English – Global – threatpost.com » Malware

Secure Hunter Anti -Malware



The post Behind the CryptoLocker Disruption Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1lFwat9

Secure Hunter

Windows 8.1 biz users face patch freeze as Microsoft sets critical updates Secure Hunter

Microsoft plans to deliver nine security updates next week, incljuding a pair of critical patches for Internet Explorer and all versions of Windows.

Computerworld Malware and Vulnerabilities News

Secure Hunter Anti -Malware



The post Windows 8.1 biz users face patch freeze as Microsoft sets critical updates Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1nxjwMD

Secure Hunter

U.S. agencies halt background checks by contractor after cyberattack Secure Hunter

Two U.S. federal agencies have halted background checks with a contractor that said Wednesday its networks had been breached in a cyberattack suspected to have been coordinated by an unnamed country.

Computerworld Malware and Vulnerabilities News

Secure Hunter Anti -Malware



The post U.S. agencies halt background checks by contractor after cyberattack Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1vfwk3U

Secure Hunter

Citadel Malware Variant Allows Attackers Remote Access, Even After Removal Secure Hunter

A new variant of the Citadel banking Trojan has been discovered where the attackers are using Windows remote shell commands to be enable Remote Desktop Protocol access, even if the malware is discovered and removed.

Threatpost – English – Global – threatpost.com » Malware

Secure Hunter Anti -Malware



The post Citadel Malware Variant Allows Attackers Remote Access, Even After Removal Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1y9492Z

Secure Hunter

Wednesday, August 6, 2014

Network-attached storage devices more vulnerable than routers, researcher finds Secure Hunter

A security review of network-attached storage (NAS) devices from multiple manufacturers revealed that they typically have more vulnerabilities than home routers, a class of devices known for poor security and vulnerable code.

Computerworld Malware and Vulnerabilities News

Secure Hunter Anti -Malware



The post Network-attached storage devices more vulnerable than routers, researcher finds Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1tZKrJb

Secure Hunter

RAT Malware Communicating Via Yahoo Mail Secure Hunter

The IcoScript remote access Trojan evades network detection by communicating via Yahoo Mail.

Threatpost – English – Global – threatpost.com » Malware

Secure Hunter Anti -Malware



The post RAT Malware Communicating Via Yahoo Mail Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1lBVsbF

Secure Hunter

Podcast: Threatpost Previews Black Hat 2014 Secure Hunter

In this special edition of the Digital Underground Podcast, Dennis Fisher interviews fellow Threatpost editor Mike Mimoso and also Threatpost reporter Brian Donohue about the Black Hat security conference, which begins this week in Las Vegas. Topics of discussion include Chris Valasek and Charlie Miller hacking automobiles, Jeff Forristal’s briefing on what promises to be a devastating Android vulnerability, why it’s dumb to host Black Hat in Las Vegas in the dead of summer, and more.

Threatpost – English – Global – threatpost.com » Malware

Secure Hunter Anti -Malware



The post Podcast: Threatpost Previews Black Hat 2014 Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/XFu5rG

Secure Hunter

IE plays security catch-up, will block outdated Java plug-ins

Microsoft’s Internet Explorer will begin blocking out-of-date ActiveX controls when the company updates the versions that run on Windows 7 and Windows 8 next week.

Computerworld Malware and Vulnerabilities News



The post IE plays security catch-up, will block outdated Java plug-ins appeared first on Secure Hunter Anti-Malware.






http://ift.tt/V2ytzi

Secure Hunter

Symantec patches privilege escalation flaws in Endpoint Protection

Symantec has released a patch for privilege escalation flaws in its Endpoint Protection product, and the company which found the issues released the exploit code on Tuesday.

Computerworld Malware and Vulnerabilities News



The post Symantec patches privilege escalation flaws in Endpoint Protection appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1sfth6d

Secure Hunter

Monday, August 4, 2014

Stealthy malware 'Poweliks' resides only in system registry

A new malware program called Poweliks attempts to evade detection and analysis by running entirely from the system registry without creating files on disk, security researchers warn.

Computerworld Malware and Vulnerabilities News



The post Stealthy malware 'Poweliks' resides only in system registry appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1v57dRv

Secure Hunter

Researchers to name the most hackable cars at Black Hat

A report to be released at Black Hat this week will reveal which vehicles are more susceptible to hackers.

Computerworld Malware and Vulnerabilities News



The post Researchers to name the most hackable cars at Black Hat appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1ltRHoP

Secure Hunter

Cisco patches traffic snooping flaw in its networking gear OSes

Cisco Systems said attackers could disrupt or intercept traffic in many of its networking products unless a new security update is applied to the software they run.

Computerworld Malware and Vulnerabilities News



The post Cisco patches traffic snooping flaw in its networking gear OSes appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1kzbqsk

Secure Hunter

Friday, August 1, 2014

Attackers can easily create dangerous file-encrypting malware, new threat suggests

A new program that encrypts files to extort money from users highlights that attackers don't need advanced programming skills to create dangerous and effective ransomware threats, especially when strong encryption technology is freely available.

Computerworld Malware and Vulnerabilities News



The post Attackers can easily create dangerous file-encrypting malware, new threat suggests appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1krO4EZ

Secure Hunter

The future of independent antimalware tests

Our guiding vision at the Microsoft Malware Protection Center (MMPC) is to keep every customer safe from malware. Our research team and machine learning systems, as well as industry engagement teams, function around the clock in an effort to achieve this vision.


As part of these efforts, we are also working with independent antimalware testing organizations towards advancing the relevance of independent testing and reporting. Our goal is to help enable independent antimalware testing organizations to test using malware that has significant customer impact. We have come a long way together, and we can still make significant advances to on-demand file-detection tests.


Current on-demand file-detection tests have some limits. They are typically carried out by first assembling a set of malware samples, and then scanning them with antimalware products. The samples in the testing set that aren’t detected by the products are counted, and then their percentage is calculated. Finally, the undetected percentage is compared to other products to calculate the comparative test results. Some testers use prevalence data to choose their sample set, and some apply curves to the results, but ultimately the fundamental test scheme is the same across the board.


One major issue with the above methodology is that there is no differentiation between samples in the test set. While each sample in the test set has a different impact on customers, in the above methodology, they are weighted equally. This methodology has been of concern to us, as it doesn’t take into account the prevalence-based customer impact.


To evolve antimalware test methodologies, this problem can be solved by weighting these samples according to their customer impact – that is, how often a particular malware sample is encountered by customers. The first step is to apply a weighting based on each specific sample’s prevalence; if the sample has impacted a large number of customers, then it will have a relatively large weight. If it’s impacted relatively few customers, then it will have a smaller weight. However, this approach isn’t quite enough.


Different malware families have different behaviors. For example, some malware families use polymorphism: they change their files with every infection, causing many samples within that family to be relatively low prevalence. In this case if the malware family has a high prevalence, but each sample has a low prevalence, then without a family weight these samples are lost in the mix. To address this, a family weight should be included in addition to the specific sample prevalence weight.


After applying the weights described above, it is possible to generate a risk factor that describes how much risk a customer faces depending on which antimalware product they use when exposed to samples in the test set. On top of that, using geographical sample weights and family weights allows for a geographical risk breakout.


This kind of prevalence-weighted test is a game changer. Shifting to a weighted approach will help customers and antimalware vendors understand how their products perform in the real-world, based on real malware prevalence and impact.


There are a few caveats to such a test. The most significant is the prevalence data itself. Where would this prevalence data come from and how would it be validated? Ideally the data can be generated and composed by an antimalware industry collaboration. The MMPC is contributing to this data and is working with other independent testers to validate it.


With the participation of the MMPC and other antimalware vendor collaborators it is possible to produce the best and most meaningful set of on-demand test results yet. This is the next step in our continued journey with independent antimalware testers to drive more relevancy into testing.


Joe Blackbird

MMPC





Microsoft Malware Protection Center



The post The future of independent antimalware tests appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1nUpk7D

Secure Hunter

Android vulnerability still a threat after nearly two years

Security researchers have recently found a vulnerability that could be used to hijack Android apps and devices, but an older issue that can have the same effect remains a significant threat nearly two years after its discovery, according to security firm Bromium.

Computerworld Malware and Vulnerabilities News



The post Android vulnerability still a threat after nearly two years appeared first on Secure Hunter Anti-Malware.






http://ift.tt/XqnjpE

Secure Hunter

Microsoft’s EMET 5.0 puts a security leash on plugins

The latest release of a Microsoft security tool that's designed to stop exploits lets administrators control when third-party plugins are launched, a long favored route for attackers.

Computerworld Malware and Vulnerabilities News



The post Microsoft’s EMET 5.0 puts a security leash on plugins appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1AHfvPO

Secure Hunter

STOP cyberbullying Cyberbullying - what it is, how it works ...Secure Hunter Anti-Malware