Top IT Security Bloggers

  • Monday review – the hot 21 stories of the week

    Sophos - Naked Security
    From NIST’s new password rules and "hunted" schoolgirls' info posted online, to scammers tricked into installing ransomware, and much more!
  • TippingPoint Threat Intelligence and Zero-Day Coverage – Week of August 15, 2016

    Trend Micro - Cloud Security Blog
    This past weekend, a hacking group calling itself The Shadow Brokers hacked the Equation Group, another hacking group with alleged ties to the United States National Security Agency (NSA). Using Twitter as their communication platform, The Shadow Brokers posted a link to a pastebin, which in turn led to more than 300 MB of exploits...
  • Twitter takes down 235K extremist accounts

    Sophos - Naked Security
    Third parties say that Islamic State traffic on Twitter has plummeted by 45% over the past 2 years.
  • Man hacks Android app to get free beer

    Sophos - Naked Security
    A Polish researcher found a loyalty awards app that could be tricked into clocking up loyalty bonuses over and over again...
  • New firmware update? No, it's the devious Marcher Android trojan up to no good

    Graham Cluley
    The Marcher trojan has come up with a new way to infect Android users: pose as a fake firmware update.
    David Bisson reports.
  • This Week in Security News

    Trend Micro - Cloud Security Blog
    Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by links to news articles and/or our blog posts providing additional insight. Be sure to check back each Friday for...
  • Police chiefs: we need the right to decrypt your stuff

    Sophos - Naked Security
    The maple leaf. Hockey. Tim Horton's donuts. Forced decryption?
  • BANKER Trojan Sports New Technique to Take Advantage of 2016 Olympics

    Trend Micro - Security Intelligence
    Despite the 2016 Olympics coming to a close, cybercriminals remain relentless in using the sporting event as a social engineering hook to distribute a banking Trojan. Earlier this month, we spotted a phishing campaign that led victims to unknowingly download the Banker malware. Although Banker has been in the wild for years, this time we see it using a Dynamic Loading Library (DLL) with malicious exported functions. One of the export calls used is to check if the victimized system is located in Brazil. If the geolocation points to Brazil, then another malicious file is downloaded. This particular new routine points to the possibility of the cybercriminals’ intention of riding on the popularity of the Olympics to lure users. Apart from Banker, there are reports indicating that other banking Trojans, are doing the same thing. For instance, Sphinx ZeuS has enhanced its capabilities because of the Olympics.
    Post from: Trendlabs Security Intelligence Blog - by Trend Micro
    BANKER Trojan Sports New Technique to Take Advantage of 2016 Olympics
  • BANKER Trojan Sports New Technique to Take Advantage of 2016 Olympics

    TrendLabs - Malware Blog
    Despite the 2016 Olympics coming to a close, cybercriminals remain relentless in using the sporting event as a social engineering hook to distribute a banking Trojan. Earlier this month, we spotted a phishing campaign that led victims to unknowingly download the Banker malware. Although Banker has been in the wild for years, this time we see it using a Dynamic Loading Library (DLL) with malicious exported functions. One of the export calls used is to check if the victimized system is located in Brazil. If the geolocation points to Brazil, then another malicious file is downloaded. This particular new routine points to the possibility of the cybercriminals’ intention of riding on the popularity of the Olympics to lure users. Apart from Banker, there are reports indicating that other banking Trojans, are doing the same thing. For instance, Sphinx ZeuS has enhanced its capabilities because of the Olympics.
    Post from: Trendlabs Security Intelligence Blog - by Trend Micro
    BANKER Trojan Sports New Technique to Take Advantage of 2016 Olympics
  • Why people ignore security alerts up to 87% of the time

    Sophos - Naked Security
    A study shows that timing is key: interrupt a user while they're doing something important, and you cause a bottleneck in their brain.

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Latest Videos

More videos

Blog Posts

Media Release

More media release