Tag Cloud

Bloggers

Blog

Follow and talk to Infosecurity's bloggers.

Follow Infosecurity's bloggers as they share their thoughts on the industry, technology, and much more. Our bloggers have been selected for their industry expertise. They welcome interaction, so we encourage you to add your opinions to theirs.

0
comments
What would you do if your personal computer were to get infected with the recent Cryptolocker malware – would you pay the ransom to get back your data? What if your company or government agency system got infected and paying the Cryptolocker ransom was the only way to get back critical bu ...
0
comments
At the recent IT Security Analysts Forum in London, organised by Eskenzi PR, one could be forgiven for thinking that the dozen or so vendors represented were all fierce competitors. Their high-level taglines all sounded pretty similar; “we secure your business’s data”, “our p ...
Posted 10 July 2013 by Bob Tarzey
0
comments
It’s McAfee. James McAfee.
A game of high-stakes, technical espionage that targets the highest levels of government? A bevy of presumably beautiful female double agents? A nefarious foe bent on the destruction of the US, operating in the shadows under a cover of legitimacy? These are not the trappings of a new James Bond inst ...
Posted 05 March 2013 by Slack Alice
0
comments
Discovering an Old Flame
Computer malware programmes only take on a name and a personality after they have been discovered. These are bestowed by the IT security industry, our would-be defenders. Before this, malware is anonymous and unknown, just the way the perpetrators want it. Such was the case with Flame, whose discov ...
Posted 26 June 2012 by Bob Tarzey
0
comments
Small Eruption in Peru*: Not Many Infected
[This is probably my last article here for 2011. Compliments of the season to you all.] Inevitably, my attention was drawn last week to an article on Mich Kabay’s Infosec Perception based on an essay by student Jeremy Legendre: Macintosh Malware Erupts. Well, I’m not in the business of ...
Posted 19 December 2011 by David Harley
0
comments
Stuxnet talks – do we listen?
Stuxnet is a severe threat – that’s something we know for sure. But if we look at it,  what do we really know? What can we learn? Let’s start from the beginning. As soon as Stuxnet hit the news, it was interesting to see, what was happening. There was a ton of speculation out ...
Posted 12 October 2010 by Roger Halbheer
0
comments
PCI, AV and a life vest
A good friend of mine over at NetIQ, Todd Tucker, recently blogged about some of the frustrations he sees when looking at the failure of PCI as a security standard (or rather, the failure of those organizations who pay lip service to compliance) and especially the oddly heavy emphasis given to ...
Posted 25 August 2010 by Geoff Webb
0
comments
Looking to save a few bucks on software will almost always lead users down a dangerous path. Users either end up at “OEM Software” sites offering unlicensed and illegal software, or to downloading cracks or keygens laced with malware.  One of the big issues here is that the ...
Posted 30 July 2010 by Rick Robinson
0
comments
eSoft researchers have been tracking a new campaign by cybercrooks, compromising and creating websites for use in SEO poisoning and malware distribution. Thousands of these sites have been detected that use elaborate techniques to trick search engines and are ready to serve malware in an i ...
Posted 30 June 2010 by Rick Robinson
0
comments
A new twitter spam campaign is making rounds, infecting users with rogue anti-virus malware. The spam mail attempts to convince the user that someone was trying to steal their Twitter account information, and to download a “secure module” to protect their account. The email that begi ...
Posted 08 June 2010 by Rick Robinson
0
comments
The eSoft Threat Prevention Team has uncovered thousands compromised web servers hosting fake YouTube pages. Attempting to play the video on these fake pages prompts the user to install a ‘media codec’ which then infects the machine with malware. The fake YouTube pages are well ...
Posted 07 June 2010 by Rick Robinson
0
comments
eSoft researchers have been tracking a recent campaign abusing Google Groups to spread malicious links in Spam emails. Users following the link are infected with a Downloader Trojan, silently infecting the machine with various types of malware including Rogue Anti-Virus. The scam starts with an e ...
Posted 12 May 2010 by Rick Robinson
0
comments
Tiger Woods (Searches) Not to Be Trusted
Tiger Woods’ personal life and marital affairs have attracted constant attention from the press and has certainly damaged his public reputation.  With his return to the Masters, Nike has released a new commercial in an effort to rebuild Woods’ image.  This compelling commer ...
Posted 08 April 2010 by Rick Robinson
0
comments
The first week of March Madness has brought about many compelling stories, with a good deal of upsets and bracket busters. The most newsworthy of these has been the University of Northern Iowa’s ousting of #1 overall seed Kansas. This ‘Cinderella’ story has deservedly gotten a grea ...
Posted 22 March 2010 by Rick Robinson
0
comments
IRS Tax Avoidance Scam
Today, eSoft is alerting customers to a new targeted email scam. This newest twist to the common IRS email scam seems to be targeted to organizations, notifying the recipient of a tax evasion complaint being filed against the company. Opening the file infects the user's machine with dangerous t ...
Posted 08 February 2010 by Rick Robinson
0
comments
The malware infection attack surface is increasing day by day. Recently, some of the infected machines with different malware classes such as file downloader are using GTALK for downloading JPG based files from the internet. Actually this file is not a JPG file but a zipped file that contains an ex ...
Posted 15 December 2009 by Aditya K Sood
0
comments
“Black Screen of Death” Reports
Oh, wow – sometimes the power of social media, the blogs and the internet can backfire. I guess in the meantime you have seen the claims by Prevx that approx. 80 million of PCs are affected by the Black Screen of Death problems supposedly caused by our November Security Updates. This caused (a ...
Posted 01 December 2009 by Roger Halbheer
0
comments
In September, eSoft reported as many as 720,000 compromised sites hosting fake blog pages and being used to distribute rogue anti-virus programmes. Many of these sites are still active and continue to plague searches with malicious results. Earlier today, Cyveillance issued this report of a nearl ...
Posted 18 November 2009 by Rick Robinson
0
comments
The web is getting a playground for different type of attacks. There is lot of talks going around about Microsoft EOT fonts realm which are being used for launching different type of attacks. Recently I gave a talk at the Excalibur Conference, China in which I talked about launching a CSRF attack i ...
Posted 13 November 2009 by Aditya K Sood
Showing 1 - 19 of 19 blogs
View the RSS feed for this blog »
We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×