Top IT Security Bloggers

  • Shade malware attack examines your finances before demanding ransom

    Graham Cluley
    To make sure victims can penny up for their files, a version of the Slade ransomware carries a special gift: remote control tools.
    David Bisson reports.
  • Justice by keylogger – the biter bit! [Chet Chat Podcast 250]

    Sophos - Naked Security
    Here's our latest security podcast - ransomware, bug hunting, keyloggers and a pair of cybercrime busts. Enjoy!
  • POS malware strikes again

    Trend Micro - Cloud Security Blog
    POS malware is in the headlines again.
  • New Locky Ransomware Spotted in the Brazilian Underground Market, Uses Windows Script Files

    TrendLabs - Malware Blog
    In a constant game of cat and mouse, the perpetrators behind Locky ransomware have updated their arsenal yet again with a new tactic—using Windows Scripting File (WSF) for the arrival method. WSF is a file type that allows the combination of multiple scripting languages within a single file. Leveraging WSF pose challenges in detection and analysis, as traditional endpoint solutions scan and filter files based on their list of monitored files. Since WSF is not commonly associated with ransomware routines, this creates a window of exposure and can possibly pass off as a non-malicious file. This was reportedly seen in Cerber’s email campaign last May. Possibly, Locky is possibly following suit to Cerber’s tactic since this is an effective tactic in bypassing security measures like sandbox and blacklisting technologies.
    Post from: Trendlabs Security Intelligence Blog - by Trend Micro
    New Locky Ransomware Spotted in the Brazilian Underground Market, Uses Windows Script Files
  • New Locky Ransomware Spotted in the Brazilian Underground Market, Uses Windows Script Files

    Trend Micro - Security Intelligence
    In a constant game of cat and mouse, the perpetrators behind Locky ransomware have updated their arsenal yet again with a new tactic—using Windows Scripting File (WSF) for the arrival method. WSF is a file type that allows the combination of multiple scripting languages within a single file. Leveraging WSF pose challenges in detection and analysis, as traditional endpoint solutions scan and filter files based on their list of monitored files. Since WSF is not commonly associated with ransomware routines, this creates a window of exposure and can possibly pass off as a non-malicious file. This was reportedly seen in Cerber’s email campaign last May. Possibly, Locky is possibly following suit to Cerber’s tactic since this is an effective tactic in bypassing security measures like sandbox and blacklisting technologies.
    Post from: Trendlabs Security Intelligence Blog - by Trend Micro
    New Locky Ransomware Spotted in the Brazilian Underground Market, Uses Windows Script Files
  • Visa Alert and Update on the Oracle Breach

    Krebs on Security
    Credit card industry giant Visa on Friday issued a security alert warning companies using point-of-sale devices made by Oracle's MICROS retail unit to double-check the machines for malicious software or unusual network activity, and to change passwords on the devices. Visa also published a list of Internet addresses that may have been involved in the Oracle breach and are thought to be closely tied to an Eastern European organized cybercrime gang.
  • IBM PC is 35 – let’s all go back to the 80s!

    Sophos - Naked Security
    It didn't look like a home computer, but that meant it was easier to get one at work, so you could....could...heck, because you could!
  • Facebook rolls out code to kick the shins off Adblock Plus reblocking

    Sophos - Naked Security
    Facebook blocks adblockers! Adblock Plus dodges! Facebook spins more code faster than you can say "sponsored ad that looks like a post!"
  • No Small Matter: Securing the Digital Economy for Enterprises of Any Size

    Isaca
    Every day, in every corner of the world, at every minute, small- and medium-sized enterprises (SMEs) are opening up stores, serving clients, delighting customers (or not). And while the classic SME picture may be the storefront, SME reality means constant commerce, updating web presences to buy, sell and service everything; work that begins before dawn and ends long after night has fallen. While precise measurements are difficult due to differing definitions of SMEs, research by the World Ban...
  • Text messages aren’t private, judge rules

    Sophos - Naked Security
    Think your text messages are considered confidential by the courts? Think again.

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Latest Videos

More videos

Blog Posts

Media Release

More media release