How Extremists Groups Radicalize Recruits Online

Anyone with access to the internet can have their voice heard. And this is exactly the philosophy behind the extremist online radicalization and recruitment efforts of various terrorist organizations, including Hezbollah and ISIS/ISIL (Islamic State of Iraq and Syria/Islamic State of Iraq and the Levant). They invest time and effort to put forward image-heavy content..
Read more

Superior Integrity Monitoring: Getting Beyond Checkbox FIM

If File Integrity Monitoring (FIM) were easy, everyone would be doing it. Actually, it is pretty easy. It’s not exactly rocket science. Practically anyone with a modicum of Python, Perl or development skills can write an app or a script to gather the checksum of a file, compare it to a list or baseline, and … Read More The post Superior Integrity Monitoring: Getting Beyond Checkbox FIM appeared first on The State of Security.
Read more

Phishing Trojan Campaign Picks Up Pace, Morphing at Scale to Defeat Legacy Detection

Phishing attacks are nothing new, but we are noticing a new trend for polymorphism, both in the wrapping document and in the dropped executable. In samples that are literally minutes old, we see the control server is re-obfuscating and updating the malware faster than anti-virus programs are updating their awareness. The changes made are more The post Phishing Trojan Campaign Picks Up Pace, Morphing at Scale to Defeat Legacy Detection appeared first on Bromium.
Read more

Augmented Reality games and real-world trolling

The popular Augmented Reality game Ingress has had some issues with third-party tools causing headaches for players. Could your love for a mobile game result in real-world problems? Read on and find out. Categories: Social engineering Threat analysis Tags: ARaugmented realitygamesgamingingressvideo games (Read more...) The post Augmented Reality games and real-world trolling appeared first on Malwarebytes Labs.
Read more
Page 1 of 3112345...102030...Last »