Home PHP Scripts Contact News Articles RSS Readers Members Area

Anti-Malware

 
Main

Security

Anti-Malware
Malware
MSNBC Security
Security Fix
Security World News
Random Feeds

Archives

| May 2017 | Apr 2017 | Mar 2017 | Feb 2017 | Jan 2017 | Dec 2016 | Nov 2016 | Oct 2016 | Sep 2016 | Aug 2016 | Jul 2016 | Jun 2016 | May 2016 | Apr 2016 | Mar 2016 | Feb 2016 | Jan 2016 | Dec 2015 | Nov 2015 | Oct 2015 | Sep 2015 | Aug 2015 | Jul 2015 | Jun 2015 | May 2015 | Apr 2015 | Mar 2015 | Feb 2015 | Jan 2015 | Dec 2014 | Nov 2014 | Oct 2014 | Sep 2014 | Aug 2014 | Jul 2014 | Jun 2014 | May 2014 | Apr 2014 | Mar 2014 | Feb 2014 | Jan 2014 | Dec 2013 | Nov 2013 | Oct 2013 | Sep 2013 | Aug 2013 | Jul 2013 | Jun 2013 | May 2013 | Apr 2013 | Mar 2013 | Feb 2013 | Jan 2013 | Dec 2012 | Nov 2012 | Oct 2012 | Sep 2012 | Aug 2012 | Jul 2012 | Jun 2012 | May 2012 | Apr 2012 | Mar 2012 | Feb 2012 | Jan 2012 | Dec 2011 | Nov 2011 | Oct 2011 | Sep 2011 | Aug 2011 | Jul 2011 | Jun 2011 | May 2011 | Apr 2011 | Mar 2011 | Feb 2011 | Jan 2011 | Dec 2010 | Nov 2010 | Oct 2010 | Sep 2010 | Aug 2010 | Jul 2010 | Jun 2010 | May 2010 | Apr 2010 | Mar 2010 | Feb 2010 | Jan 2010 | Dec 2009 | Nov 2009 | Oct 2009 | Sep 2009 | Aug 2009 | Jul 2009 | Jun 2009 | May 2009 | Apr 2009 | Mar 2009 |

Fri, 26 May 17
A Rising Trend: How Attackers are Using LNK Files to Download Malware
http://feeds.trendmicro.com/~r/Anti-MalwareBlog/~3/W2Qlsi7LIRY/
PowerShell is a versatile command-line and shell scripting language from Microsoft that can integrate and interact with a wide array of technologies. It runs discreetly in the background, and can be used to obtain system information without an executable file. All told, it makes an attractive tool for threat actors. There were a few notable instances...Post from: Trendlabs Security Intelligence Blog - by Trend MicroA Rising Trend: How Attackers are Using LNK Files to Download Malware

Thu, 25 May 17
Victims Lost US$1B to Ransomware
http://feeds.trendmicro.com/~r/Anti-MalwareBlog/~3/ThzQV1od_-o/
Over the course of 2016, ransomware operators trailed their sights on bigger targets—companies and organizations, both large and small—and raked in US$1 billion for their efforts.Even before WannaCry reared its ugly head, companies and individuals worldwide have already been suffering the threat’s dire consequences—all documented in our report, “Ransomware: Past, Present, and Future.” After just one year, we saw a staggering 752% increase in the number of ransomware families.Post from: Trendlabs Security Intelligence Blog - by Trend MicroVictims Lost US$1B to Ransomware

Sat, 20 May 17
Android Security Bulletin Tackles Additional Critical Mediaserver Issues
http://feeds.trendmicro.com/~r/Anti-MalwareBlog/~3/-4C0OQf9qK0/
Google released their security bulletin for May, which once again tackles Critical vulnerabilities in Android’s Mediaserver component, a prevailing theme for the past few bulletins. Post from: Trendlabs Security Intelligence Blog - by Trend MicroAndroid Security Bulletin Tackles Additional Critical Mediaserver Issues

Fri, 19 May 17
Will Astrum Fill the Vacuum in the Exploit Kit Landscape?
http://feeds.trendmicro.com/~r/Anti-MalwareBlog/~3/8fXkNuwkaAA/
The decline of exploit kit activity—particularly from well-known exploit kits like Magnitude, Nuclear, Neutrino, and Rig during the latter half of 2016—doesn’t mean exploit kits are throwing in the towel just yet. This is the case with Astrum (also known as Stagano), an old and seemingly reticent exploit kit we observed to have been updated multiple times as of late. Astrum’s recent activities feature several upgrades and shows how it's starting to move away from the more established malware mentioned above. It appears these changes were done to lay the groundwork for future campaigns, and possibly to broaden its use. With a modus operandi that deters analysis and forensics by abusing the Diffie-Hellman key exchange, it appears Astrum is throwing down the gauntlet. Post from: Trendlabs Security Intelligence Blog - by Trend Micro Will Astrum Fill the Vacuum in the Exploit Kit Landscape?

Thu, 18 May 17
After WannaCry, UIWIX Ransomware and Monero-Mining Malware Follow Suit
http://feeds.trendmicro.com/~r/Anti-MalwareBlog/~3/dJTaxoDjNPs/
WannaCry ransomware’s outbreak during the weekend was mitigated by having its kill switch domain registered. It was only a matter of time, however, for other cybercriminals to follow suit. Case in point: the emergence of UIWIX ransomware (detected by Trend Micro as RANSOM_UIWIX.A) and one notable Trojan our sensors detected.Post from: Trendlabs Security Intelligence Blog - by Trend MicroAfter WannaCry, UIWIX Ransomware and Monero-Mining Malware Follow Suit

Sat, 13 May 17
Massive WannaCry/Wcry Ransomware Attack Hits Various Countries
http://feeds.trendmicro.com/~r/Anti-MalwareBlog/~3/wJ6KZm6T4U8/
Earlier this year, two separate security risks were brought to light: CVE-2017-0144, a vulnerability in the SMB Server that could allow remote code execution that was fixed in March, and WannaCry/Wcry, a relatively new ransomware family that spread via Dropbox URLs in late April. These two threats have now been combined, resulting in one of the most serious ransomware attacks to hit users across the globe.Post from: Trendlabs Security Intelligence Blog - by Trend MicroMassive WannaCry/Wcry Ransomware Attack Hits Various Countries

Sat, 13 May 17
PUA Operation Spreads Thousands of Explicit Apps in the Wild and on Legitimate App Stores
http://feeds.trendmicro.com/~r/Anti-MalwareBlog/~3/zqBGGGCM0eg/
One of the most popular ways to make money online is through pornography—whether through legitimate distribution or different online scams. Last year we detected a new variant of the Marcher Trojan targeting users through porn sites, and the year before that popular porn apps were used as lures to compromise millions of mobile users in...Post from: Trendlabs Security Intelligence Blog - by Trend MicroPUA Operation Spreads Thousands of Explicit Apps in the Wild and on Legitimate App Stores

Thu, 11 May 17
Microsoft Addresses Zero-Day Vulnerability Ahead of Patch Tuesday
http://feeds.trendmicro.com/~r/Anti-MalwareBlog/~3/AEd8Dll2gcc/
Microsoft addresses a zero-day vulnerability that exploits the Microsoft Malware Protection Engine before May's Patch Tuesday.Post from: Trendlabs Security Intelligence Blog - by Trend MicroMicrosoft Addresses Zero-Day Vulnerability Ahead of Patch Tuesday

Wed, 10 May 17
Persirai: New Internet of Things (IoT) Botnet Targets IP Cameras
http://feeds.trendmicro.com/~r/Anti-MalwareBlog/~3/pciWAR34roQ/
By Tim Yeh, Dove Chiu and Kenney Lu A new Internet of Things (IoT) botnet called Persirai (Detected by Trend Micro as ELF_PERSIRAI.A) has been discovered targeting over 1,000 Internet Protocol (IP) Camera models based on various Original Equipment Manufacturer (OEM) products. This development comes on the heels of Mirai—an open-source backdoor malware that caused some of the most...Post from: Trendlabs Security Intelligence Blog - by Trend MicroPersirai: New Internet of Things (IoT) Botnet Targets IP Cameras

Fri, 5 May 17
iPhone Phishing Scam Crosses Over Physical Crime
http://feeds.trendmicro.com/~r/Anti-MalwareBlog/~3/OVAHsFMgOOc/
Last late April a friend of mine had his iPhone stolen in the streets—an unfortunately familiar occurrence in big, metropolitan areas in countries like Brazil. He managed to buy a new one, but kept the same number for convenience. Nothing appeared to be out of the ordinary at first—until he realized the thief changed his Facebook password. Fortunately, he was able to recover and update it, as his phone number was tied to his Facebook account. But a pickpocket accessing his victim’s Facebook account is quite unusual. After all, why would a crook be interested with his victim’s Facebook account for when the goal is usually to use or sell the stolen device? It didn’t stop there; a day after, my friend curiously received a phishing SMS message on his new phone. What’s interesting here is the blurred line between traditional felony and cybercrime—in particular, the apparent teamwork between crooks and cybercriminals that results in further—possibly more sophisticated—attacks. Post from: Trendlabs Security Intelligence Blog - by Trend Micro iPhone Phishing Scam Crosses Over Physical Crime

 

amigura.co.uk All Rights Reserved.