The security business is booming. In the past five years, more than 1,200 startups have joined the game, with Wall Street assigning them record valuations. At the same time, high-profile data breaches...
Forget making the football team or honor society, for teens, social hierarchy is measured by how hefty your follower count is on Twitter. Studies show that while Facebook is still the #1 social network...
Selling stolen data is an easy way for cybercriminals to make some quick money on cyber black markets.
The following flowchart shows a generic credential-stealing campaign in action. In the last step,...
Get cutting-edge security as it happens. Read our experts’ tips and techniques to help you avoid and defeat the latest malware trends, and view portions of their actual research to stay even more informed.
Selling stolen data is an easy way for cybercriminals to make some quick money on cyber black markets. The following flowchart shows a generic credential-stealing campaign in action. In the last step, the flow is bidirectional. The malware makes a two-way authentication-free connection between the victim and the attacker. This two way connection not only […]
The packaging of malware and malware-construction kits for cybercrime “consumers” has been a long-running trend. Various turnkey kits that cover remote access plus botnet plus stealth functions are available just about anywhere. Ransomware, though very prevalent, has not yet appeared in force in easy-to-deploy kits. But now we have Tox–and it’s free. […]
Lately, McAfee Labs has observed a lot of active samples detected as Trojan Laziok by many security vendors. According to online reports, the Trojan Laziok is dropped via an exploit of the Microsoft Windows Common Controls ActiveX Control Remote Code Execution Vulnerability (CVE-2012-0158), which arrives via a spam email. In contrast, we have identified the […]
In recent days, much has been said and written around the recently disclosed “Venom” vulnerability. It is important to fully understand the real-world severity of vulnerabilities such as Venom. Although the threat is potentially severe and certainly interesting (it is in a class of relatively rare guest escapes from virtual machines), one has to take into […]
This post was written with the invaluable assistance of my colleague Rakesh Sharma. Intel security has recently observed a malware spreading through Facebook. This type of malware is not new, but it keeps evolving using new spreading mechanisms. A few days ago, we came across a Facebook post with this subject: [Username] shared a link […]