Source: National Cyber Security – Produced By Gregory Evans The next time a long-forgotten Facebook friend sends you an odd picture, it’s probably best to leave it alone. Cyber-criminals have found a creative way to weasel into your computer: implanting malicious code inside a Facebook Messenger picture. For the The…
Media, Malware, and Analysis Analyst Job
Source: National Cyber Security – Produced By Gregory Evans Description: SAIC currently has a contingency position for a Media, Malware and Analysis Analyst to support the United States Cyber Command (USCYBERCOM) at Fort Meade, Maryland. JOB DESCRIPTION: Media, Malware and Analysis (MMA) is the forensic analysis of media and The…
Cyber Security – Malware Analyst Reverse Engineer
Source: National Cyber Security – Produced By Gregory Evans Locations: Plano, TX IT and Internet Apply Job Description Expert technical analyst in malware reversing, intrusion techniques, and network and internet technologies. Develops or extracts IOCs from malicious binaries. Works closely with IR, VMT, and TDO The post Cyber Security…
Chinese hackers accused of ‘politically motivated’ malware attacks against Hong Kong
Source: National Cyber Security – Produced By Gregory Evans A state-sponsored hacking group believed to be aligned with the People’s Republic of China has been accused of targeting two Hong Kong government agencies in a “politically motivated” attack just prior to the legislative elections which took place on 4 The…
Eddie Bauer data breach: What you need to know about malware intrusion
Source: National Cyber Security – Produced By Gregory Evans Eddie Bauer is looking into a sophisticated malware intrusion of its point of sale systems. The company said unauthorized parties accessed payment card information, including cardholder name, number, security code and expiration date, at retail stores between Jan. 2 and The…
Hackers Use Google’s Ad Network To Spread “Fake Login” Malware
Source: National Cyber Security – Produced By Gregory Evans For years, security firms have warned of keystroke logging malware that surreptitiously steals usernames and passwords on desktop and laptop computers. In the past year, a similar threat has begun to emerge on mobile devices: So-called overlay malware that impersonates The…
New Android Malware Blocks Outgoing Calls To Banks To Keep You From Reporting Or Canceling Suspicious Activity
Source: National Cyber Security – Produced By Gregory Evans Online security experts have discovered a new Android malware that blocks outgoing calls to banks to keep customers from complaining about suspicious activity. Symantec, an American technology company, found the Android.Fakebank.B malware app in October 2013. The app replaces banking apps…
Hackers raid Taiwanese ATMs with banking malware that spits cash on command
Source: National Cyber Security – Produced By Gregory Evans Investigators in Taiwan are on the lookout for two Russian nationals suspected of hacking into ATMs and stealing more than $2 million in cash. It is believed that the two crooks used a mobile phone to trigger 41 ATMs into dispensing…
10 million Android devices affected by Chinese malware earning millions for hackers
Source: National Cyber Security – Produced By Gregory Evans Check Point, a cybersecurity software maker, estimates that at least 10 million Android devices have been infected by the HummingBad malware since it was seen last February. The malware generates US$300,000 a month of ad revenue for the hacking group. The…
Wendy’s says payment card info accessed in malware attack
Source: National Cyber Security – Produced By Gregory Evans Criminals stole credit card info — including names and numbers — in a malware attack revealed earlier this year at more than 300 franchise locations in the US. Wendy’s is serving up more details about a malware attack on its point-of-sale…