Posts Tagged 'computer security'

This post was written with Diwakar Dinkar. McAfee Labs recently came across the new ransomware variant HydraCrypt. Like some previous ransomware variants, HydraCrypt is distributed using the Angler exploit kit. HydraCrypt encrypts a victim’s files and appends the filenames with the extension “hydracrypt_ID_<8 random characters>.” The malware also drops one plain-text file on the victim’s machine […]

This post was written by Oliver Devane and Mohinder Gill of Intel Security. We recently received a sample from a customer and upon initial analysis it looked like a bundled software installer. Upon execution, the installer launches a website and then attempts to download an executable—an installer for FLV Player. Nothing out of the ordinary, […]

One constant in cybersecurity is the continual rise of sophistication and creativity of attackers. In 2016, we will see a fundamental expansion of their techniques, including the rise of integrity attacks. The industry has become accustomed to traditional availability and confidentiality attacks, which are typically crude but often effective. Denial of service attacks, for example, undermine […]

With the growth of the Internet of Things, going from 15 billion to 200 billion devices by 2020, and the focus by attackers to get further down the stack, silicon-based security will play an increasing role in protecting technology and users. As attackers evolve, they get stronger, smarter, and more resourceful. Traditional defensive structures must […]

Welcome to part 3 of our discussion on data exfiltration. Sit down and make yourself comfortable as we get inside the mind of data thieves and explore the types and formats of data that interest them most. Just in case there’s any doubt in your mind, our primary research findings, based on a survey of […]