The GravityRAT malware, discovered by Cisco Talos researchers, gives some interesting insight into modern malware development.
Read more on Virus Bulletin’s blog.
Month: April 2018
How malware can sneak in through M&A
Companies that handle sensitive customer data have even more to worry about when making an acquisition. Not only do they have to be sure the acquired company has good security, but they can’t let their guard down even after the acquisition closes.
Read more on Payment Source. (Note: subscription wall.)
A BGP hijack was used to take over some of Amazon’s DNS infrastructure, which was then used to serve a phishing site to users of the MyEtherWallet service.
Read more on Virus Bulletin’s blog.
Various security companies are offering security-focused routers. This is a good trend and may help mitigate a lot of the issues that come with the IoT.
Read more on Virus Bulletin’s blog.
Most of the switch from IPv4 to IPv6 will happen seamlessly. But we cannot assume it won’t introduce new security issues.
Read more on Virus Bulletin’s blog.
Compromised websites are being used to serve fake Flash Player uploads that come with a malicious payload.
Read more on Virus Bulletin’s blog.
A Cambridge professor has found how an 1816 legal ruling can be used to trace stolen bitcoins, thus potentially making it easier for governments to legislate bitcoin exchanges.
Read more on Payment Source. (Note: subscription wall.)
A clever trick taking advantage of the fact that Gmail ignores dots in email addresses could be used to trick someone into paying for your Netflix subscription – demonstrating the importance of confirmed opt-in.
Read more on Virus Bulletin’s blog.
The one thing more valuable to consumers than their bank accounts might be their internet access โ and a new version of the โTrickbotโ trojan targets both.
Read more on Payment Source. (Note: subscription wall.)