Email Alerts
-
Red October malware attacks highlight attribution problems
The recent Red October attacks show not only a new level of complexity, but an ongoing problem with attack attribution. News | 23 Jan 2013
-
Project Mayhem hack details enterprise accounting system flaws
Proof-of-concept code targets Microsoft Dynamics Great Plains platform and can enable an attacker to transfer funds to accounts of their choosing. News | 27 Dec 2012
-
A new targeted Trojan, Batchwiper, wipes data from drives
Symantec has confirmed the existence of the targeted Trojan it calls Batchwiper. News | 17 Dec 2012
-
Crafty click fraud Trojan uses left mouse click to evade detection
A Trojan horse waits for a left mouse click to execute each step of the infection process, according to new research from FireEye Inc. News | 14 Dec 2012
-
Cybercrime 2012: Malware attacks prominent in retail, financial industries
Malware attacks were the most prominent in the retail and financial services industries in 2012. News | 13 Dec 2012
-
Cutwail botnet spam campaign tied to Zeus banking Trojan
The cybercriminals connected to the notorious Zeus Trojan are using the Cutwail botnet to distribute spam designed to steal account credentials. News | 05 Dec 2012
-
Custom, targeted malware attacks demand new malware defense approach
Widespread use of custom malware in targeted attacks requires better attack preparation and response, and a variety of new malcode defenses. News | 16 Nov 2012
-
Malware identified as latest Mac Trojan targeting activists
Apple platform security firm Intego has discovered OSX/Imuler.E, a new variant of the Imuler Trojan. News | 14 Nov 2012
-
Ransomware variant works on Windows 8, Symantec says
The Ransomlock.U Trojan can successfully lock computers running Windows 8, according to a test performed by researchers at Symantec. News | 14 Nov 2012
-
Adobe investigates zero-day that bypasses Reader X sandbox
Zero-day exploit Zero-day exploit was added to a custom version of the Black Hole attack toolkit, according to a Russian-based security firm Group IB. News | 09 Nov 2012
Security Management Strategies for the CIO