Crooks have found a new venue to push malware: the official Google Chrome Web Store. It was recently used to hawk Chrome browser extensions secretly hijacking users’ Facebook profiles. According to Kaspersky Lab expert Fabio Assolini, one malicious extension hosted on Google’s own servers contained hidden code that “can gain complete…
Microsoft disrupts servers used by feared Zeus bank Trojan
In the most significant cybercrime bust of the year so far, Microsoft and US banking organisations say they have disrupted a number of the most active botnets that have been attacking online banking customers across the world with impunity using the Zeus crimeware. On 19 March, the company filed a…
Fake BBB, LinkedIn E-mails Used to Distribute Malware
The e-mails link to compromised WordPress sites that host the BlackHole Exploit Kit. View full post on eSecurityPlanet RSS Feed View full post on National Cyber Security
Chinese Trojans used to attack pro-Tibet organisations
A malware campaign targeting activists at pro-Tibet organisations could be the work of the same Chinese group behind a major attack on the chemical industry last year, researchers from AlienVault have suggested. The new attack uses a malicious Word attachment sent by email to organisations including the Central Tibet Administration…
Twitter Being Used by Malware Developers: Symantec
Symantec security researchers are seeing cyber-criminals increasingly using Twitter as a way of luring mobile device users to their malware. In a March 12 post on Symantec’s blog, company employee Joji Hamada said that tweets are becoming a popular way for cyber-criminals to bring people to the Android.Opfake malware. “Users…
Can Big Data be used to catch network invaders?
The buzz in security circles about “Big Data” goes something like this: If the enterprise could only unite its security-related event data with a warehouse of business information, it could analyse this Big Data to catch intruders trying to steal sensitive information. This is the security angle to the Big…
Mock Cyber Attack on New York Used by Obama to Pitch Senate Bill
The Obama administration simulated a cyber attack on New York City’s power supply in a Senate demonstration aimed at winning support for legislation to boost the nation’s computer defenses. View full post on obama hacking government – Yahoo! News Search Results View full post on National Cyber Security
Skype malware used in Syrian confilct
A new nasty piece of malware is now being used in the ongoing conflict in Syria, with the ability to take over an infected computer or steal documents from it. Computer security firm Trend Micro cited reports the malware, dubbed DarkComet, is being used against supporters of the Syrian opposition…
Barchie Consulting: If it’s too complex then it won’t be used
View full post on National Cyber Security
BBB phishing line used in scam
E-mail phishing scams using the Better Business Bureau's name and logo continue to proliferate across the Web. View full post on phishing – Yahoo! News Search Results View full post on National Cyber Security