Posts Tagged ‘Malware’

GuLoader Malware Uses Advanced Anti-Analysis Techniques to Evade Detection

An advanced malware downloader named GuLoader has recently been exposed by cybersecurity researchers at CrowdStrike. This advanced downloader has the capability to evade the detection of security software by adopting a variety of techniques. While analyzing the shellcode of GuLoader, a brand-new anti-analysis technique was discovered by CrowdStrike through which researchers would be able to identify if the […]

Leave a Comment

95.6% of New Malware in 2022 Targeted Windows

Malware attacks are a growing problem in our increasingly digital world. By infiltrating computers and networks, malicious software can cause serious harm to those affected by it. One of the most common types of malware is ransomware (encryption-based malware), which prevents users from accessing their files until they pay a hefty fee to the cyber […]

Leave a Comment

Researchers Sound Alarm on Dangerous BatLoader Malware Dropper

BatLoader has spread rapidly to roost in systems globally, tailoring payloads to its victims. BatLoader has spread rapidly to roost in systems globally, tailoring payloads to its victims.

Leave a Comment

Active Raspberry Robin Worm Launch a ‘Hands-on-Keyboard’ Attacks To Hack Entire Networks

During recent research, Microsoft has discovered evidence of a complex interconnected malware ecosystem that is associated with the Raspberry Robin worm. With other malware families, there are several root links to the Raspberry Robin worm were identified. Even security experts have detected that it uses alternate infection tactics as well. Infections like these lead to […]

Leave a Comment

New Disk Wiping Malware Targets Israel

Advanced malware analysis

Leave a Comment

Malware Analysis

Malware Analysis   Malware Analysis: An Introduction – SANS.org   Introduction to Malware Analysis | SANS Lenny Zeltser   Five Awesome Tools to perform Behavioural Analysis of Malware Earlier posts on Malware | DISC InfoSec blog  Subscribe in a reader

Leave a Comment

Your employees aren’t the only threat to InfoSec and Compliance

July 22nd, 2013 by Lewis Morgan  I overheard a conversation the other day, one which left me so stunned that I’ve decided to write about it…. Two men having dinner behind me (I got the impression they were both directors) were discussing the £200k fine the NHS received for losing patient data. Eventually, the conversation […]

Leave a Comment

Controls against industrial Malware

Malicious software is called a malware and malware may include viruses, worms and trojans. A virus is a piece of code which is capable of replicating itself and mainly it depends on a host file (a document) to reach its target. However worm does not rely on the host file to reach the target but […]

Leave a Comment

10 reasons to ponder before using your smartphone for banking

  Mobile Payment Security 01) There is no clear legislation that sets out your rights to receive a refund if your bank account is fraudulently emptied due to mobile bank app insecurity. The burden of proof seems to be on the user to protect their handset, operating system, software, mobile operator infrastructure and everything else […]

Leave a Comment

The Rise of Malicious Traffic on Networks and how it Infect

  Sophisticated malicious attacks can go largely undetected by most antivirus software.  Defense in depth approach requires organizations to monitor for malicious activity, malware (bot traffic) at various levels of the network, perimeter layer, application level and subsequently at critical data level. How an end user might become infected, the obvious scenario being possibly our […]

Leave a Comment

Phishing emerges as major corporate security threat

Source: Computer World The successful use of phishing emails to breach secure organizations like Oak Ridge National Laboratory and RSA are stark reminders of the serious threat posed by what some experts have dismissed as as a low-tech method of attack. Oak Ridge, a U.S. Department of Energy-run research lab, this week disclosed it had […]

Comments (3)

Biggest mobile malware threat

Image via CrunchBase Facebook is biggest mobile malware threat, says security firm Researcher claims bad links on Facebook responsible for much higher infection rate that targeted mobile malware By Joan Goodchild -CSO The biggest mobile infection threat isn’t malware that specifically targets mobile devices, according to new research from security firm BitDefender. Malware that targets […]

Leave a Comment

The Basics of Stuxnet Worm and How it infects PLCs

Image by biatch0r via Flickr Considered to be the most intricately designed piece of malware ever, Stuxnet leverages attack vectors onto industrial control systems, a territory rarely ventured into by traditional malware. Stuxnet targets industries, power plants and other facilities that use automation and control equipment from the leading German industrial vendor, Siemens. The term, […]

Comments (1)

New virus threatens phones using Android

Image via Wikipedia Mobile Malware Attacks and Defense WASHINGTON (AFP) – A virus infecting mobile phones using Google’s Android operating system has emerged in China that can allow a hacker to gain access to personal data, US security experts said. A report this week from Lookout Mobile Security said the new Trojan affecting Android devices […]

Leave a Comment

Stuxnet, world’s first “cyber superweapon,” attacks China

Image by toastiest via Flickr Stuxnet, the most sophisticated malware ever designed, could make factory boilers explode, destroy gas pipelines, or even cause a nuclear plant to malfunction; experts suspect it was designed by Israeli intelligence programmers to disrupt the operations of Iran’s nuclear facilities — especially that country’s centrifuge farms and the nuclear reactor […]

Comments (1)

8 tips for safer online shopping

Image by Matthieu Dejardins, eCommerce Activist via Flickr By Microsoft.com Online threats today come in the form of attacks on you and attacks on your computer. Here are eight (8) ways for you to have a safer online shopping experience: 1. Keep your computer software up to date. Keep all software (including your web browser) […]

Leave a Comment

Spam, malware proliferate in late 2009

Image by colodio via Flickr Alejandro Martínez-Cabrera Online security firm Websense has released a report on the cyberthreat landscape during the second half of 2009, and some of the findings are jaw dropping: The firm, which scans millions of Web sites and e-mails a day looking for malicious content, found that 95 percent of all […]

Leave a Comment

Pop-Up Security Warnings Pose Threats

Image by Travelin’ Librarian via Flickr Malware: Fighting Malicious Code By FBI NPO The FBI warned consumers today about an ongoing threat involving pop-up security messages that appear while they are on the Internet. The messages may contain a virus that could harm your computer, cause costly repairs or, even worse, lead to identity theft. […]

Comments (2)

Hackers’ attacks rise in volume, sophistication

Year in review for online security attacks – 2009 is going to be known as a year of change in tactics of exploitation, rather than creating more new tools in hacker’s community. They are utilizing social media as a tool to exploit and using built-in trust in social media to their advantage. That’s why stealing […]

Leave a Comment

Viruses That Leave Victims Red in the Facebook

Image by Intersection Consulting via Flickr By BRAD STONE – NYTimes.com It used to be that computer viruses attacked only your hard drive. Now they attack your dignity. Malicious programs are rampaging through Web sites like Facebook and Twitter, spreading themselves by taking over people’s accounts and sending out messages to all of their friends […]

Comments (2)