Category: Threat Intel
-
Why Ransomware Works: Arrival Tactics
Why Ransomware Works: Arrival Tactics http://ift.tt/28YGnEl By Jon Oliver and Joseph C. Chen Apart from understanding the ransomware tactics and techniques beyond encryption, it is equally important to understand how they arrive in the environment. Our recent analysis reveals that majority of ransomware families can be stopped at the exposure layer—web and email. In fact,…
-
IRS hacked again – say goodbye to that PIN system!
IRS hacked again – say goodbye to that PIN system! http://ift.tt/28Zpj3T In the wake of automated attacks speeding up, the US tax overlords – the Internal Revenue Service (IRS) – has likewise sped up plans to deep-six its repeatedly hacked PIN system. The IRS on Thursday announced that it’s removed its electronic filing PIN tool…
-
Two-factor authentication (2FA): why you should care
Two-factor authentication (2FA): why you should care http://ift.tt/28W80dT Online security can feel a bit like an arms race sometimes, and it may seem like there’s always something new to keep track of. But many of the more tried-and-true security principles and methods have been around for a while, they just take a while to become more…
-
Ransomware with a Pirate Name, RAA! [Chet Chat Podcast 243]
Ransomware with a Pirate Name, RAA! [Chet Chat Podcast 243] http://ift.tt/295rm60 Paul Ducklin is a passionate security proselytiser. (That’s like an evangelist, but more so!) He lives and breathes computer security, and would be happy for you to do so, too. Follow him on Twitter: @duckblog Threat Intel via Naked Security – Sophos http://ift.tt/1pHdTOi June…
-
The Latest Android Overlay Malware Spreading via SMS Phishing in Europe
The Latest Android Overlay Malware Spreading via SMS Phishing in Europe http://ift.tt/28ZIc5j Introduction In April 2016, while investigating a Smishing campaign dubbed RuMMS that involved the targeting of Android users in Russia, we also noticed three similar Smishing campaigns reportedly spreading in Denmark (February 2016), in Italy (February 2016), and in both Denmark and Italy…
-
Chrome bug gives pirates a way to steal streaming movies
Chrome bug gives pirates a way to steal streaming movies http://ift.tt/2949Dd4 Security researchers have discovered a bug in Google Chrome that gives pirates a way to copy paid-for movies streamed from sites like Netflix and Amazon Video. Movie streaming services rely on DRM (Digital Rights Management) technology to keep a lid on piracy by controlling…
-
Ransomware bites NASCAR team: lessons learned… fast
Ransomware bites NASCAR team: lessons learned… fast http://ift.tt/29jXpeK You can’t outrun ransomware: either prevent it, or pay up. Maybe that’s the lesson from the latest high profile ransomware victim: the NASCAR team Circle Sport-Leavine Family Racing (CSLFR). Days before CSLFR planned to field Michael McDowell in Chevy No. 95 at Texas Motor Speedway, strange things…
-
Are Google and Facebook to block extremist content with automatic hashing?
Are Google and Facebook to block extremist content with automatic hashing? http://ift.tt/29jZ0ks Since 2008, the National Center for Missing & Exploited Children (NCMEC) has offered to share with ISPs a list of hash values that correspond to known child porn images. That list, which was eventually coupled with Microsoft’s own PhotoDNA technology, has enabled companies…
-
Mining Companies Under Attack
Mining Companies Under Attack http://ift.tt/28ZzVKY Cyber espionage campaigns against the mining industry are largely geared towards ensuring interest groups have access to the latest technical knowledge and intelligence so they can maintain competitive advantage and thrive in the global commodities market. In this blog post, we illustrate this pattern with the case of the attacks…
-
Burglar who dropped phone has no right to privacy, judge says
Burglar who dropped phone has no right to privacy, judge says http://ift.tt/290l1Yb No, a judge declared last week, a burglar who drops his phone as he flees the house has no privacy right that would prevent police from searching the phone to track him down… …and lead them to find evidence incriminating him in a…