Lying dormant cyber pathogen Posted by Rob Slade on March 8, 2016.For those of you who are concerned about lying dormant cyber pathogens I have some advice:Be afraid. Be very afraid.You see, I’ve got one. Actually, I’ve got more than one.Why not? I’ve been studying
Tyupkin gang arrested by Europol Posted by Kevin on January 7, 2016.Europol has disrupted an East European gang using the Tyupkin trojan to steal from bank ATMs. Eight people have been arrested following house raids in Romania and Moldova. Few details have been provided in the Europol
Still speculating about anti-virus after all these years? Posted by Kevin on June 23, 2015.The Intercept yesterday published an article titled Popular Security Software Came Under Relentless NSA and GCHQ Attacks. I am one who in the past has wondered about the relationship between the
Did you see what they wrote about you? Phishing! Posted by Kevin on June 13, 2015.The last thing you do when you get this message is click the link; because the first thing you think is, uh-oh – scam.But, hey, this is a security company. Surely it can’t have been hacked? Maybe th
FireEye/Mandiant points finger at China – again When I first started commenting on FireEye the company was noticeably reluctant to attribute malware and malware campaigns to specific actors. The accusation market changed when Mandiant published its famous report: APT1 Exposing One of C
Crimefighters take down Beebone botnet EU and US crimefighters have announced today that, in conjunction with Intel Security, Kaspersky and Shadowserver from the private sector, they have taken down the Beebone botnet (also known as the AAEH botnet).I would normally say that such state
Avast, there, AV vendors … I noticed, recently, that some of my email was going out bearing the message:> This email has been checked for viruses by Avast antivirus software.> http://www.avast.comI use Avast, so I wasn’t too worried. It’s (generally) a decent p
Trusteer vs. Minded Security in fighting financial fraud We’re talking financial fraud – malware-instigated theft from your bank account…This will be sacrilege to many, but I’m no fan of two-factor authentication (2FA). In fact, I think it can be positively dangerous.
Time to reject GCHQ and rebuild a Free Albion One of my favourite companies is F-Secure. F-Secure is a company that hasn’t just sat back and said, ‘Oh, how terrible – governments are spying on us.’ F-Secure is fighting back by developing the technology that makes it m
Your free adult toy is the Angler EK Demonstrating the continuous intellectual battle between cyber attackers and security researchers, Malwarebytes has an interesting post on a newly found malvertising sample.Bad-adThe ad, featuring tiny-toyz.com, is placed by the agency AdXpansion
ITsecurity Daily News: 08/29/2014 The ITsecurity daily security briefing: Friday, August 29, 2014.If you find this security briefing useful, please spread the word via social media. If you have any comments or recommendations, please email kevtownsend at gmail dot com.NewsPapers/Report
Phish for supper? No thank you, I don’t think I’ll bother…But if any security researcher (don’t try this at home, chaps) would like to tell me what lies behind http://vekokar dot com/Gmail-webmail.html (the actual link disguised as Click here) I’d be inter
Magnitude – an exploit kit par excellence Trustwave has had sight of the inner workings and underlying infrastructure of the Magnitude exploit kit – the coming EK that is rapidly filling the gap left by Blackhole. As Blackhole declines following the arrest of its developer, Paunch, so