Email Security

Remtasu trojan latest tactic: posing as malicious Facebook app

Remtasu trojan latest tactic: posing as malicious Facebook app

By

The Windows-based trojan Remtasu has switched tactics, disguising itself as a malicious application for accessing people's Facebook account credentials.

Powell, Rice use of private email highlights government-wide security problem

Powell, Rice use of private email highlights government-wide security problem

By

The Office of the Inspector General (OIG) said Colin Powell and Condeleeza Rice both used private email for classified information and a heavily redacted email from John Kerry showed that he likewise used a private email account

Brazilian companies being targeted by malicious spam campaign

Brazilian companies being targeted by malicious spam campaign

By

Symantec has discovered a spam campaign targeting Portuguese-language computers specifically focusing on companies based in Brazil with the goal of stealing email accounts in order to access sensitive corporate information.

It's back...Dridex campaigns on uptick

It's back...Dridex campaigns on uptick

By

Aimed at manufacturing, telecommunications, and financial services sectors, Dridex has reemerged after a post-holiday slowdown.

Spam dunk: Case study

Spam dunk: Case study

By

For its email needs, the Cavaliers Operating Company in Cleveland got an assist to avoid the junk folder. Greg Masters reports.

Scarlet Mimic group targets minority activists, likely government supported

Scarlet Mimic group targets minority activists, likely government supported

By

Unit 42 researchers said Scarlet Mimic is behind attacks against minority rights activists that began more than four years, though they've shifted both their tactics and the malware used.

Opponents to Swiss surveillance law force direct public vote

Opponents to Swiss surveillance law force direct public vote

By

A Swiss digital surveillance law that has rankled online privacy advocates will now subjected to a public vote, after opponents collected enough signatures to challenge the legislation.

FACC AG, Belgian bank fall victim to BEC

FACC AG, Belgian bank fall victim to BEC

By

An aircraft components designer and a Belgian bank were the latest victims of the business email compromise (BEC), prompting the IC3 to issue an alert.

Clinton server could have been hacked by foreign adversaries, ex-Pentagon chief

Clinton server could have been hacked by foreign adversaries, ex-Pentagon chief

By

Classified information on a server belonging to Hillary Clinton may have been hacked by foreign adversaries, ex-Pentagon chief Robert Gates said.

House of Cards' Kevin Spacey fears Sony hack repeat

House of Cards' Kevin Spacey fears Sony hack repeat

Having recently taken on the studio boss role at Relativity Studios, House of Cards star Kevin Spacey fears a hack similar to that of Sony Pictures will occur again.

Social engineering scam targets SMBs with trojans, report warns

Social engineering scam targets SMBs with trojans, report warns

By

A crude but dangerous email-based social engineering scam has been targeting small-to-medium-size businesses in the U.S., U.K. and India since early 2015, the Symantec Security Response blog warned today.

Cisco Annual Security Report 2016: "There is a higher calling"

Cisco Annual Security Report 2016: "There is a higher calling"

Cisco's Annual Security Report shows SMBs to be under-defended and recommends collaboration as the way to combat the bad guys.

Marijuana stock driven high, then dumped, by spam campaign

Marijuana stock driven high, then dumped, by spam campaign

By

Symantec is investigating a pump and dump stock spam campaign that used the long-lived W.32 Waledac botnet to target a marijuana farming company possibly generating thousands in illegal profits.

Let's spam! David Bowie death exploited by social engineering campaign

Let's spam! David Bowie death exploited by social engineering campaign

By

Cybercriminals wasted no time in exploiting the media attention focused on the passing of rock icon David Bowie.

We can read encrypted emails on BlackBerry devices, Dutch team says

We can read encrypted emails on BlackBerry devices, Dutch team says

By

Despite an encrypted email service on BlackBerry smartphones, forensic investigators in the Netherlands said they can read encrypted messages sent on the devices.

Cybergang targets Japanese banks with Rovnix Trojan

Cybergang targets Japanese banks with Rovnix Trojan

By

Researchers at IBM X-Force have spotted an aggressive infection campaign targeting major Japanese banks.

Fitbit warranty fraud bombards and fools customer service

Fitbit warranty fraud bombards and fools customer service

Recent warranty fraud attempts on Fitbit have occurred in the last few months, with customer service being barraged with emails from customers claiming that their device is not working as expected and demanding replacements.

Time Warner Cable says 320,000 customer emails potentially stolen

Time Warner Cable says 320,000 customer emails potentially stolen

By

Time Warner Cable (TWC) is blaming a phishing attack conducted on one of its vendors for a data breach that may have resulted in 320,000 TWC customer emails and other personal information being stolen.

Loose talk on social media big security risk for firms, says Kaspersky

Loose talk on social media big security risk for firms, says Kaspersky

Social media users are largely unaware of the value to attackers of personal information they are freely sharing with friends and strangers alike, warns Kaspersky Lab.

STIX and Taxi - Part 2

STIX and Taxi - Part 2

We ended up last time with an introduction to the use of STIX and TAXII for threat hunting. Our last topic was STIX indicators so that's a good place to start this time.

Thar she blows: Whaling attacks likely to rise in 2016

Thar she blows: Whaling attacks likely to rise in 2016

Whaling attacks eschew technical sophistication in favour of a good old fashioned confidence trick and according to cyber-security company, Mimecast, they're on the rise.

Prediction: 2016 to Ratchet Up IoT Vulnerabilities, Ransomware

Prediction: 2016 to Ratchet Up IoT Vulnerabilities, Ransomware

By

The security experts from ESET who report at We Live Security (WLS) took out their crystal ball and predicted the following cybercrime trends for the coming year.

Google Testing Password-Free Logins

Google Testing Password-Free Logins

By

Google beta testers are logging on without passwords, utilizing a new method that authenticates by responding to a notification sent to a smartphone.

Pre-Christmas browsers get more than they were angling for

Pre-Christmas browsers get more than they were angling for

Tempting collection of free Christmas images lures 60,000 users into Angler exploit kit sleigh ride. Destination: CryptoWall 4.0.

New, improved Macro malware hitting Microsoft Office

New, improved Macro malware hitting Microsoft Office

By

The comeback was 16 years in the making, but macro malware is once again on security professional's radar in a big way impacting at least 100,000 people since it began its resurgence earlier this year, according to Intel Security

Nemucod Trojan usage on the rise, but damage limited

Nemucod Trojan usage on the rise, but damage limited

By

The Nemucod trojan is on the rise and being used to spread Teslacrypt ransomware via phishing campaigns, although the silver lining is not as many people are being victimized this time around.

Getting workers to 'buy-in' to cybersecurity

Getting workers to 'buy-in' to cybersecurity

By

Two security industry pros said its time for organizations to make sure their workers understand the importance of cyber security and actively take part in defending their company.

Twitter's hacker warning has users scratching their heads

Twitter's hacker warning has users scratching their heads

By

An email sent by Twitter late last week warning some users that they may be targeted by state-sponsored hackers has elicited more confusion than concern.

Roath man involved in "paedo hunt" sentenced to 9 years in prison

Roath man involved in "paedo hunt" sentenced to 9 years in prison

Earlier this year, Lee Philip Rees of Roath, Cardiff was found guilty of computer hacking, distribution of indecent child photos and blackmail.

Former State Department worker pleads guilty to sextortion charges

Former State Department worker pleads guilty to sextortion charges

By

A former U.S. State Department staffer pleaded guilty to a variety of crimes related to a sextortion scheme he was operating.

Sign up to our newsletters

RECENT COMMENTS

FOLLOW US