It’s coming on two decades now since the first warnings that US critical infrastructure is vulnerable to a catastrophic cyberattack. According to some experts, it is perhaps more vulnerable now than ever – the threats are worse and the security is no better. 989 more words
Tags » Malware
Email is indisputably a critical enterprise communication tool essential for sending important documents quickly and efficiently between employees, managers, HR, finance, sales, legal, customers, supply chain and more. 15 more words
SANS ISC handler Xavier Mertens has flagged and analyzed a malicious Word file that, somehow, is made to automatically download an additional malicious RTF file, ultimately leading to a RAT infection. 57 more words
At this point, we assume that most savvy Android users know to be on the lookout for suspicious apps and download prompts, but even as smartphone users become more aware of the risks of downloading apps, the creators of the most vicious malware have adapted by releasing increasingly subtle Trojans that can do a great deal of damage behind the scenes without alerting the user. 271 more words
A special kind of malware has been hitting the headlines recently – that which attacks the RAM of Point of Sale (PoS) systems.
Although it’s been getting quite a bit of publicity recently, we actually first identified it as a threat back in December 2009 and wrote about it in an article on Naked Security entitled 1,126 more words