web analytics

Forensics Tool Flaw Allows Hackers to Manipulate Evidence

By Eduard Kovacs on May 11, 2017   A vulnerability in Guidance Software’s EnCase Forensic Imager forensics tool can be exploited by hackers to take over an investigator’s computer and manipulate evidence, researchers warned. The vendor has classified the attack as an “edge case” and it does not plan on patching the flaw any time… Continue reading Forensics Tool Flaw Allows Hackers to Manipulate Evidence

Session Hijacking, Cookie-Stealing WordPress Malware Spotted

By Chris Brook May 10, 2017                                                      Researchers have identified a strain of cookie stealing malware injected into a legitimate JavaScript file, that masquerades as a WordPress core domain.   Cesar Anjos, a security analyst at Sucuri, a firm that specializes in WordPress… Continue reading Session Hijacking, Cookie-Stealing WordPress Malware Spotted

SLocker Ransomware Variants Surge

10th May 2017  By Dawn Kawamoto   SLocker, one of the top 20 Android malware families, has seen a six-fold increase in the number of new versions over the past six months.   New variants of an Android ransomware family have surged over the past six months to some 600 unique versions.   That’s a… Continue reading SLocker Ransomware Variants Surge

Your IoT Baby Isn’t as Beautiful as You Think It Is

10th May 2017  By Andrew Howard   Both development and evaluation teams have been ignoring security problems in Internet-connected devices for too long. That must stop.   When looking at Internet-enabled products, the following are the top security concerns companies should look at:   Basic hygiene issues: Default or no password, unnecessary active services, unpatched… Continue reading Your IoT Baby Isn’t as Beautiful as You Think It Is

Adware the series, part 3

See Also: Adware the series, part 1 Adware the series, part 2   May 10, 2017 by Pieter Arntz                                                  In this series of posts, we will be using the flowchart below to follow the process of determining which adware we are dealing with.… Continue reading Adware the series, part 3

New French president’s team used honeypots to delay, distract Russian hackers

Emmanuel Macron’s digital team filled fake accounts with garbage data to slow Russian info ops. Sean Gallagher (US) – 10/5/2017   The failed effort by Russian attackers to influence the outcome of the French presidential campaign in its final hours was in part a forced error, thanks to an active defense by the digital team… Continue reading New French president’s team used honeypots to delay, distract Russian hackers

Microsoft Security Updates May 2017

Executive Summary No more Windows Vista patches. This is the last patch day for the Windows 10 RTM release. It won’t be supported anymore after today. Updates were released for all supported client and server versions of Windows. Other Microsoft products with patches are: Internet Explorer, Microsoft Edge, Microsoft Office, the Microsoft .NET Framework, and… Continue reading Microsoft Security Updates May 2017

Cyber security professionals ‘admit to paying ransom’

Cyber criminals Are winning and now research has revealed that even security professionals are paying ransoms and bypassing corporate security                                         By Nick Ismail 9th May 2017   Bromium, the virtualisation-based enterprise security that stops advanced malware attacks, today released new research conducted at the RSA Conference (RSAC)… Continue reading Cyber security professionals ‘admit to paying ransom’

New Persirai IoT Botnet Emerges

By Ionut Arghire on May 09, 2017   Around 120,000 Internet Protocol (IP) Camera models based on various Original Equipment Manufacturer (OEM) products are vulnerable to a newly discovered Internet of Things (IoT) botnet, Trend Micro warns.   Dubbed Persirai, the new botnet’s development comes on the heels of Mirai, the IoT malware that became… Continue reading New Persirai IoT Botnet Emerges

Cisco patches switch hijacking hole – the one exploited by the CIA

Telnet security flaw fix finally lands – or just use SSH, yeah?                                     9 May 2017 at 18:25, Shaun Nichols   Cisco has patched a critical security flaw in its switches that can be potentially exploited by miscreants to hijack networks – a flaw disclosed in the Vault 7… Continue reading Cisco patches switch hijacking hole – the one exploited by the CIA