GDPR compliance in legacy environments

The General Data Protection Regulation (GDPR) that takes effect next May will require businesses to protect the privacy of any personal data that they manage. There are many ways to do this, but the GDPR strongly encourages the use of pseudonymization, which, depending on how the business currently manages the personal data it acquires, may or may The post GDPR compliance in legacy environments appeared first on Voltage.
Read more

More Than 120 Malware Detections Triggered on NSA Employee’s Computer

Kaspersky Lab has concluded an internal investigation into an incident that led to the company being accused of using its antivirus program to copy secret files from the personal computer of an NSA employee. The company believes it has identified the incident in its logs, but telemetry data revealed more than 120 malware detections on..
Read more

Phishing Trojan Campaign Picks Up Pace, Morphing at Scale to Defeat Legacy Detection

Phishing attacks are nothing new, but we are noticing a new trend for polymorphism, both in the wrapping document and in the dropped executable. In samples that are literally minutes old, we see the control server is re-obfuscating and updating the malware faster than anti-virus programs are updating their awareness. The changes made are more The post Phishing Trojan Campaign Picks Up Pace, Morphing at Scale to Defeat Legacy Detection appeared first on Bromium.
Read more

Quarantine Flaw in Antivirus Products Allows Privilege Escalation

The malware quarantine feature in several antivirus products could have been abused by local attackers to gain administrative privileges on computers. The issue, dubbed AVGater, was discovered by Florian Bogner, a researcher with security firm Kapsch. It exploits a user’s ability to restore suspicious files that antivirus programs have moved to quarantine. Bogner found a..
Read more

New Research in Invisible Inks

It's a lot more chemistry than I understand: Invisible inks based on "smart" fluorescent materials have been shining brightly (if only you could see them) in the data-encryption/decryption arena lately.... But some of the materials are costly or difficult to prepare, and many of these inks remain somewhat visible when illuminated with ambient or ultraviolet light. Liang Li and coworkers...
Read more

Singles’ Day deal seekers beware

Originally a day set aside for singles in China to be proud of their singlehood, Singles’ Day has been transformed into what is arguably the world’s single largest e-commerce festival, thanks to the involvement of The Alibaba Group. In fact, the Alibaba Group alone reported $17.8 billion in sales; six times higher than what was... Categories: 101 Infographics Tags: antivirusapacblack fridaycyberattackcybercrimeecommerceSingles' Day (Read more...) The post Singles’ Day deal seekers beware appeared first on Malwarebytes Labs.
Read more

The need for speed – Your data unleashed!

I have a fun question for you: Which of these is the faster of the two cars? Take your time, think about it from different perspectives. I’ll wait… And let me give you a hint—it’s a trick question, so double-check your assumptions. If you picked the T-Bucket hot rod on the left, you may be The post The need for speed – Your data unleashed! appeared first on Voltage.
Read more

Fancy Bear Adopts New DDE Attack Against Microsoft Office

Russian cyberespionage group Fancy Bear is using a recently publicized technique that abuses a legitimate Microsoft Office feature to create documents that can install malware. For the past several years the most common method of embedding malicious code in Microsoft Office documents has been through macros, scripts that automate tasks in Office programs. In response,..
Read more
Page 1 of 1512345...10...Last »