Trojan masquerading as PDF signed with stolen government certificate

Trojan masquerading as PDF signed with stolen government certificate


Trojan masquerading as PDF signed with stolen government certificate

Posted: 14 Nov 2011 10:52 AM PST

Since the discovery of the Stuxnet worm, and especially after the recent string of certification authority compromises, cyber attackers' practice of using digital certificates to sign malware and impe...

Mass manipulation through automated social engineering

Posted: 14 Nov 2011 09:19 AM PST

In the past few years, social engineering has become cyber attackers' preferred method for gaining access to target systems, and it usually takes the form of a spoofed email or message booby-trapped w...

Cyber crooks should get tougher sentences, says PCeU chief

Posted: 14 Nov 2011 08:54 AM PST

Cyber fraudsters and robbers often receive considerably lighter sentences that their real-world counterparts, says Detective Superintendent Charlie McMurdie, the head of UK's Police Central e-crime Un...

Study of next-generation firewall deployments

Posted: 14 Nov 2011 06:35 AM PST

The results of a Ponemon Institute survey show 55 percent of users globally, and 64 percent in the U.S., are leveraging next-generation firewalls to augment their current security deployments, rather ...

Joomla! security bypass weakness and XSS vulnerability

Posted: 14 Nov 2011 06:25 AM PST

A weakness and a vulnerability have been reported in Joomla!, which can be exploited by malicious people to bypass certain security restrictions and conduct cross-site scripting attacks, according to ...

Security threats to expand in 2012

Posted: 14 Nov 2011 05:56 AM PST

Attackers are sidestepping automated security technology and are using social engineering and data mining to orchestrate attacks against prominent individuals and their corporate networks, according t...

Top five tips to avoid bad apps

Posted: 14 Nov 2011 05:41 AM PST

While reported mobile malware incidents are still relatively low in number, McAfee Labs is seeing significant growth in the mobile malware threat landscape. Due to the fact that smartphones and tab...

Apple OS X sandbox hole allows bypassing of restrictions

Posted: 14 Nov 2011 05:25 AM PST

Following Apple's announcement that all applications submitted for inclusion in the App Store will have to have sandboxing implemented starting from March 1, 2012, researchers from Core Labs, the rese...

Hacked Sky News Twitter account falsely reports on Murdoch arrest

Posted: 14 Nov 2011 04:02 AM PST

Hacking Twitter feeds of popular mainstream media outlets is a perfect way of getting your message across to or create panic among a great number of people. It has also lately been used by hacker grou...

IBM unveils mobile security service

Posted: 13 Nov 2011 11:15 PM PST

IBM unveiled its Hosted Mobile Device Security Management service that helps organizations protect against data loss and other risks caused by device theft, unauthorized access, malware, spyware, and ...

Week in review: Cell phone money laundering, hardware Trojans and iOS flaw that allows downloading of malicious code

Posted: 13 Nov 2011 09:01 PM PST

Here's an overview of some of last week's most interesting news and articles: Browser bloat and privacy concerns An increase in browser-based bloat and malware, and growing concern over online t...

0 comments:

Post a Comment