Tags » Malware

How likely is a 'digital Pearl Harbor' attack on critical infrastructure?

It’s coming on two decades now since the first warnings that US critical infrastructure is vulnerable to a catastrophic cyberattack. According to some experts, it is perhaps more vulnerable now than ever – the threats are worse and the security is no better. 989 more words

Security Threats

Top tips to protect your business from becoming a malware hub - IT SECURITY GURU

Email is indisputably a critical enterprise communication tool essential for sending important documents quickly and efficiently between employees, managers, HR, finance, sales, legal, customers, supply chain and more. 15 more words

Cyber Security

Attackers turn to auto-updating links instead of macros to deliver malware - Help Net Security

SANS ISC handler Xavier Mertens has flagged and analyzed a malicious Word file that, somehow, is made to automatically download an additional malicious RTF file, ultimately leading to a RAT infection. 57 more words

Cyber Security

New Android malware can secretly steal your credit card data, calls and texts

At this point, we assume that most savvy Android users know to be on the lookout for suspicious apps and download prompts, but even as smartphone users become more aware of the risks of downloading apps, the creators of the most vicious malware have adapted by releasing increasingly subtle Trojans that can do a great deal of damage behind the scenes without alerting the user. 271 more words


How do you protect yourself from ransomware?

(Source: www.businesstimes.com.sg)

Ransomware announces itself to users and leaves a very obvious signature of activity on an infected system. The first priority is to apply strong endpoint anti-virus protections on systems. 737 more words

Money Matters

A look at Point of Sale RAM scraper malware and how it works

A special kind of malware has been hitting the headlines recently – that which attacks the RAM of Point of Sale (PoS) systems.

Although it’s been getting quite a bit of publicity recently, we actually first identified it as a threat back in December 2009 and wrote about it in an article on Naked Security entitled  1,126 more words


Faketoken: el troyano bancario que invade Android

Por: Karolina Zepeda

Los expertos en seguridad han hablado y descubrieron que una nueva versión del troyano bancario que invade la industria de Android, su nombre es… 565 more words