Toast Overlay Weaponized to Install Several Android MalwareNov 10, 2017, 09:03 AM Ben Gane
We uncovered new Android malware that can surreptitiously install other malware on the affected device via the Toast Overlay attack: TOASTAMIGO, detected by Trend Micro as ANDROIDOS_TOASTAMIGO. The malicious apps, one of which had over 500,000 installs as...
Cybercriminal Undergrounds: Social and Economic PhilosophiesNov 10, 2017, 08:55 AM Ben Gane
When you think of a hacker, what's the first thing that comes to mind? It might be a lone person typing away in a dark room, an image commonly represented in movies and television. However, the world of cybercrime is much more sophisticated than this. Attackers are forming groups...
The Ivanti Threat Thursday Update for November 9, 2017: Malware EvolvesNov 10, 2017, 08:49 AM Ben Gane
Greetings. Hackers fine-tune ransomware and other malware to make their attacks more effective and disruptive. You doubtless have opinions, reactions, and perhaps even suggestions. All are welcome – so please share. Thanks in advance.
Tricking Web Apps into Running Malicious CodeNov 9, 2017, 09:30 AM Ben Gane
Whenever you’re online, you connect to a server that responds to your requests. Depending on the defenses, the web application you use may be vulnerable to injection types of attacks. Among the most prominent are XSS and SQL injection; another one is known as HTTP response splitting...
IoT taps into rural America, senators concerned about securityNov 9, 2017, 09:28 AM Ben Gane
During a hearing this Tuesday Nov. 7, US senators discussed the importance and even possible implementation of IoT technology in rural areas of the United States, although connectivity is still an important issue they have to solve...
Why do people cover their webcams? Should you too?Nov 8, 2017, 14:13 PM Ben Gane
Last year you will undoubtedly have seen a photo of Mark Zuckerberg, with his computer in the background displaying a piece of tape covering his built-in webcam. This led to mild pandemonium whilst the listening public scrambled to copy him, because if he's doing it, it must be something to...
Forcepoint Security Predictions 2017 - How did we do?Nov 8, 2017, 10:40 AM Ben Gane
Every year, Forcepoint makes security predictions for the 12 months ahead. Here, we review how well we did in our 2017 Predictions Report, released in November of 2016...
REDBALDKNIGHT/BRONZE BUTLER’s Daserf Backdoor Now Using SteganographyNov 8, 2017, 09:04 AM Ben Gane
REDBALDKNIGHT, also known as BRONZE BUTLER and Tick, is a cyberespionage group known to target Japanese organizations such as government agencies (including defense) as well as those in biotechnology, electronics manufacturing, and industrial chemistry. Their...
Forcepoint NGFW excels in security. Yet again.Nov 8, 2017, 08:57 AM Ben Gane
Forcepoint’s mission is to help people rethink cybersecurity – to take a new approach that is far more secure, efficient and resilient for today’s rapidly shifting world. This was the founding principle of our next generation firewall, and today we’re pleased to announce yet more proof...