Tag Archives: antivirus software

Important Endpoint Security & Threat Intelligence Tools List

Endpoint Security & Threat Intelligence Tools are more often used by security industries to test the vulnerabilities in network and applications. Here you can find the Comprehensive Endpoint Security & Threat Intelligence Tools list that covers Performing Penetration testing Operation … Continue reading

Posted in anti-malware | Tagged , , , , , , , , , , , , , , , , , , , , , , | Comments Off on Important Endpoint Security & Threat Intelligence Tools List

Multi-Stage Word Attack Infects Users Without Using Macros

Spam distributors are using a new technique to infect users with malware, and while this attack relies on having users open Word documents, it does not involve users having to allow the execution of macro scripts. This new macro-less technique … Continue reading

Posted in anti-malware | Tagged , , , , , , , , , , , , , , , , , , , , , , | Comments Off on Multi-Stage Word Attack Infects Users Without Using Macros

Telegram Founder: Crypto Mining Malware Attack Isn’t Due to App Flaw

Telegram Founder: Crypto Mining Malware Attack Isn’t Due to App Flaw Russian cybersecurity firm Kaspersky Lab reported today that a vulnerability in Telegram’s messaging app had been exploited to turn desktop computers into unwitting crypto-miners – a claim that the … Continue reading

Posted in anti-malware | Tagged , , , , , , , , , , , , , , , , , , , , , , | Comments Off on Telegram Founder: Crypto Mining Malware Attack Isn’t Due to App Flaw

PoS Malware Steals Credit Card Data via DNS Requests

February 9th, 2018 By Catalin Cimpanu     Malware hunters from US security firm Forcepoint have stumbled across a new strain of Point of Sale (PoS) malware, the second such type of PoS malware that hides stolen credit/debit card information … Continue reading

Posted in anti-malware | Tagged , , , , , , , , , , , , , , , , , , , , , , | Comments Off on PoS Malware Steals Credit Card Data via DNS Requests

Security Glue Between the Silos of Endpoint, Server, Cloud and Network Security Gets More Critical

February 8th, 2018 By Greg Young   Endpoint and Host security techniques have diverged. There used to be considerable similarity between the techniques and tools used to secure desktops, servers, and even networks. Desktops evolved to become Endpoints, as mobile … Continue reading

Posted in anti-malware | Tagged , , , , , , , , , , , , , , , , , , , , , , | Comments Off on Security Glue Between the Silos of Endpoint, Server, Cloud and Network Security Gets More Critical

Evolving Hancitor downloader remains alive and well, relying on malicious hosted servers

February 7th, 2018 By Bradley Barth   Despite its relatively small pool of viable targets, the malicious Windows-based downloader Hancitor continues to surface in malspam campaigns that recently have relied heavily on distribution servers set up via fraudulent hosting provider … Continue reading

Posted in anti-malware | Tagged , , , , , , , , , , , , , , , , , , , , , , | Comments Off on Evolving Hancitor downloader remains alive and well, relying on malicious hosted servers

Technology Bytes Anniversary Wake / Geek Gathering – Friday, March 2nd 2018

Technology Bytes went off the air 1 year ago. Join us for a memorial geek gathering in honor of this occasion. We will be meeting at our old hangout, Khon’s Wine Darts And Coffee located at 2808 Milam. There’s plenty … Continue reading

Posted in anti-malware | Tagged , , , , , , , , , , , , , , , , , , , , , , | Comments Off on Technology Bytes Anniversary Wake / Geek Gathering – Friday, March 2nd 2018

Keeping kids safe online – trying to practice what I preach

February 6th, 2018 By Maria Varmazis     Being a blogger in the world of cybersecurity, I’ve rather firmly established myself in the eyes of my friends and family as the person to go to with questions about an app … Continue reading

Posted in anti-malware | Tagged , , , , , , , , , , , , , , , , , , , , , , | Comments Off on Keeping kids safe online – trying to practice what I preach

Misconfigured Amazon Web Services bucket exposes 12,000 social media influencers

February 5th, 2018  By Robert Abel   Another misconfigured Amazon Web Services (AWS) S3 cloud storage bucket has been left insecure this time exposing the sensitive data of 12,000 social media influencers, most of whom were female.   On January … Continue reading

Posted in anti-malware | Tagged , , , , , , , , , , , , , , , , , , , , , , | Comments Off on Misconfigured Amazon Web Services bucket exposes 12,000 social media influencers

Comnie Continues to Target Organizations in East Asia

January 31, 2018 By Josh Grunzweig   Unit 42 has been tracking a series of attacks using a remote backdoor malware family named Comnie, which have been observed targeting organizations in the East Asia region. Comnie, first named by Sophos … Continue reading

Posted in anti-malware | Tagged , , , , , , , , , , , , , , , , , , , , , , | Comments Off on Comnie Continues to Target Organizations in East Asia