Categories
Security

GravityRAT malware takes your system's temperature

The GravityRAT malware, discovered by Cisco Talos researchers, gives some interesting insight into modern malware development.
Read more on Virus Bulletin’s blog.

Categories
Security

How malware can sneak in through M&A

Companies that handle sensitive customer data have even more to worry about when making an acquisition. Not only do they have to be sure the acquired company has good security, but they can’t let their guard down even after the acquisition closes.
Read more on Payment Source. (Note: subscription wall.)

Categories
Security

$150k in cryptocurrency stolen through combined BGP-DNS hijack

A BGP hijack was used to take over some of Amazon’s DNS infrastructure, which was then used to serve a phishing site to users of the MyEtherWallet service.
Read more on Virus Bulletin’s blog.

Categories
Security

Security-focused routers may help to mitigate IoT threats

Various security companies are offering security-focused routers. This is a good trend and may help mitigate a lot of the issues that come with the IoT.
Read more on Virus Bulletin’s blog.

Categories
Security

The road to IPv6 is generally smooth but contains a few potholes

Most of the switch from IPv4 to IPv6 will happen seamlessly. But we cannot assume it won’t introduce new security issues.
Read more on Virus Bulletin’s blog.

Categories
Security

Patch early, patch often, but don't blindly trust every 'patch'

Compromised websites are being used to serve fake Flash Player uploads that come with a malicious payload.
Read more on Virus Bulletin’s blog.

Categories
Security

How to trace stolen bitcoin? The answer may be a 200-year-old U.K. law

A Cambridge professor has found how an 1816 legal ruling can be used to trace stolen bitcoins, thus potentially making it easier for governments to legislate bitcoin exchanges.
Read more on Payment Source. (Note: subscription wall.)

Categories
Security

Netflix issue shows email verification really does matter

A clever trick taking advantage of the fact that Gmail ignores dots in email addresses could be used to trick someone into paying for your Netflix subscription – demonstrating the importance of confirmed opt-in.
Read more on Virus Bulletin’s blog.

Categories
Security

New malware freezes user's device in account takeover scheme

The one thing more valuable to consumers than their bank accounts might be their internet access โ€” and a new version of the โ€˜Trickbotโ€™ trojan targets both.
Read more on Payment Source. (Note: subscription wall.)