Recent Posts

Pages: [1] 2 3 ... 10
Security Software / Re: SUPERAntiSpyware Updates
« Last post by hayc59 on Today at 06:04:35 pm »
SUPERAntiSpyware v6.0.1258

Whats New
• Service release
• Misc. bug fixes
• Under-the-hood changes to support future feature enhancements

Download : SUPERAntiSpyware 6.0
Download : SUPERAntiSpyware 6.0 PRE-Release
 boxarrow Download : Release History
BY: June 21, 2018  By Pierluigi Paganini

Researchers at Sucuri reported crooks are using a very simple evasion technique to reinfect Magento websites after their malicious code has been removed.

Cybercriminals have devised a method to hide the malicious code, the ‘credit card stealer reinfector’, used to reinfect the websites and continue to steal personal and financial data.

The credit card stealer reinfector is hidden inside the default configuration file (config.php) of Magento installs, it is included on the main index.php and is loaded with every page visited by the users, this process ensures that the code is re-injected into multiple files of the website.

full article here:
June 21, 2018  By Pierluigi PaganiniHow would you feel about having a device in your home that’s always listening to what’s going on, standing ready to record, process and store any information it receives? That might be a somewhat alarmist way of putting it, but it’s essentially what smart home speakers do.

Smart speakers offer audio playback but also feature internet connectivity and often a digital assistant, which dramatically expands their functionality.

With today’s smart speakers, you can search the internet, control other home automation devices, shop online, send text messages, schedule alarms and more.

full article here:


By Ionut Arghire on June 21, 2018

The Red Alert 2.0 Android Trojan first detailed in September last year is currently available for rent on underground forums at $500 per month, Trustwave reports.

It is also capable of stealing information from the infected devices, including SMS messages and contact details, can block calls from banks, and can also keep in touch with bots via Twitter in the event its command and control (C&C) server is taken online.

When they detailed the threat in September last year, SfyLabs’ researchers said the malware included around 60 60 HTML overlays used to steal login credentials, but also revealed that the Trojan’s actor was constantly releasing updates for their malicious program.

A Trustwave report published this week reveals that the malware author is currently advertising the Trojan as targeting nearly 120 banks in Australia, Austria, Canada, Czech Republic, Poland, Denmark, Germany, France, Lithuania, India, Italy, Ireland, Japan, New Zeeland, Romania, Spain, Sweden, Turkey, United Kingdom, and the United States.

full article here:
 by Lindsey O'Donnell

What will new General Data Protection Regulation laws mean for websites that use sneaky web trackers such as browser fingerprinting to profile visitors? Privacy experts say the practice is likely illegal under the newly-enacted GDPR regulation. But they also say don’t expect the method of tracking users to disappear anytime soon, said the Electronic Frontier Foundation in a report issued Tuesday.

Using the HTML5 framework, websites are able to identify users (or a browser image) not by cookies, but the unique characteristics of a browser such as fonts, SVG widgets and WebGL—for starters. The technique is called browser fingerprinting or canvas fingerprinting. Websites harvest the browser data to produce a single, unique identifier to track users across multiple websites without any actual identifier persistence on the user’s machine.

full article here:
By Catalin Cimpanu

New versions of the SamSam ransomware will not execute unless the person running the malware's payload enters a special password via the command-line.

This is a new protection mechanism added by the SamSam crew in a recent SamSam version analyzed and detailed by Malwarebytes, Sophos, and Crowdstrike researchers.

Previous versions did not feature this mechanism, meaning anyone who found a SamSam binary could have infected his computer by double-clicking and running the file.

full article here:
By Catalin Cimpanu

Chinese police have arrested 16 employees of a local IT company on charges of hacking after deploying cryptocurrency miners on thousands of computers at Internet cafes in 30 cities.

The group was arrested last week, according to Chinese news site Hangzhou. Police say the 16 were employees of an IT company who had computer servicing contracts with various Internet cafes across China.

The sixteen stand accused of installing hidden cryptocurrency miners on the computers they serviced since July 2017.

full article here:
By Lawrence Abrams

Call me a cynic, but one thing I have learned from the using the Internet is to double-check, if not triple-check, everything you download. So many downloads have malware, adware, and scripts that perform malicious activities on your computer that it has to be a requirement to thoroughly check a download before it's used.

This point is shown in research posted by Tenable reverse engineer Jacob Baines, where he shows how a normally harmless VPN configuration file can be used to open a backdoor on a computer that uses it.

full article here:
By Catalin Cimpanu

Ukrainian police announced the arrest of four suspects on accusations of running six fake cryptocurrency exchanges. The four men, aged between 20 and 26, were arrested last week in the city of Dnipro.

Police said the four had "special knowledge and skills in the field of programming" and "have created their own CMS-system for managing the content of exchange sites."

The four created at least six fake cryptocurrency exchange sites on which they stole funds from users. The group kept their reputation intact via online reviews pushing fake positive ratings.

full article here:
BY:  Stuart Winter-Tear, Secure Design Analyst, Continuum SecurityJune 21, 2018

Keen observers will have noted an uptick in activity around threat modeling within the information security community recently with new tools being released and strategies and methodologies being discussed on social media; culminating in a week-long threat modeling track at the Open Security Summit (formally OWASP Summit).

Threat modelling works to identify, communicate, and understand threats and mitigations within the context of protecting something of value.

This is achieved by addressing the four following questions:

1. What are we building? Architecture / Data flow / Data classification.

2. What can go wrong? Main threats that apply to your application.

3. What are we going to do about that? Actions to take in response to this.

4. Did we do a good enough job? Retrospective analysis of the above.

full article here:
Pages: [1] 2 3 ... 10