Articles by 'Gotham'

By Gotham, Posted in Security

July 15, Softpedia – (International) Janicab Mac malware uses RLO to hide file extension. Researchers at F-Secure discovered a piece of malware for Macs dubbed Backdoor:Python/Janicab.A that uses the right-to-left override (RLO) character to mask file extensions. The malware aims to take screenshots and record audio and gets its command server’s address via YouTube videos and other Web sites. Source: http://news.softpedia.com/news/Janicab-Mac-Malware-Uses-RLO-to-Hide-File-Extension-368292.shtml July 15,... read more.

  • July 16, 2013

By Gotham, Posted in Security

July 15, Softpedia – (International) Janicab Mac malware uses RLO to hide file extension. Researchers at F-Secure discovered a piece of malware for Macs dubbed Backdoor:Python/Janicab.A that uses the right-to-left override (RLO) character to mask file extensions. The malware aims to take screenshots and record audio and gets its command server’s address via YouTube videos and other Web sites. Source: http://news.softpedia.com/news/Janicab-Mac-Malware-Uses-RLO-to-Hide-File-Extension-368292.shtml July 15,... read more.

  • July 16, 2013

By Gotham, Posted in Security

July 12, Softpedia – (International) Another Android vulnerability allows hackers to turn legitimate apps into malware. Researchers reported finding a vulnerability in Android that can allow an attacker to modify Android apps without altering cryptographic signatures in APK files under 64KB in size, similar to a recent vulnerability reported by Bluebox Security that works on larger files. Source: http://news.softpedia.com/news/Another-Android-Vulnerability-Allows-Hackers-to-Turn-Legitimate-Apps-into-Malware... read more.

  • July 15, 2013

By Gotham, Posted in Security

July 12, Softpedia – (International) Another Android vulnerability allows hackers to turn legitimate apps into malware. Researchers reported finding a vulnerability in Android that can allow an attacker to modify Android apps without altering cryptographic signatures in APK files under 64KB in size, similar to a recent vulnerability reported by Bluebox Security that works on larger files. Source: http://news.softpedia.com/news/Another-Android-Vulnerability-Allows-Hackers-to-Turn-Legitimate-Apps-into-Malware... read more.

  • July 15, 2013

By Gotham, Posted in Security

The Blue Coat Security and Policy Enforcement Center delivers the industry’s most sophisticated technology for mitigating risk. Its suite of products will protect you against web- and network-based threats, expand your security footprint, prevent data loss, and give you flexible business policy control across all networks – enterprise, web, social and mobile. Join Gotham Technology Group and Blue Coat to learn how your business can: Reduce the risk of corporate data loss Reduce risk against advanced... read more.

  • July 12, 2013

By Gotham, Posted in Security

The Blue Coat Security and Policy Enforcement Center delivers the industry’s most sophisticated technology for mitigating risk. Its suite of products will protect you against web- and network-based threats, expand your security footprint, prevent data loss, and give you flexible business policy control across all networks – enterprise, web, social and mobile. Join Gotham Technology Group and Blue Coat to learn how your business can: Reduce the risk of corporate data loss Reduce risk against advanced... read more.

  • July 12, 2013

By Gotham, Posted in Security

July 11, The Register – (International) HP admits to backdoors in storage products. Hewlett-Packard (HP) issued a security advisory after an undocumented administrator account was discovered in its StoreVirtual products. The vulnerability can be remotely exploited to disrupt devices and wipe data. Source: http://www.theregister.co.uk/2013/07/11/hp_prepping_fix_for_latest_ storage_vuln/ July 11, Softpedia – (International) Shadowlock ransomware tells victims to complete survey to unlock their PCs. Symant... read more.

  • July 12, 2013

By Gotham, Posted in Security

July 11, The Register – (International) HP admits to backdoors in storage products. Hewlett-Packard (HP) issued a security advisory after an undocumented administrator account was discovered in its StoreVirtual products. The vulnerability can be remotely exploited to disrupt devices and wipe data. Source: http://www.theregister.co.uk/2013/07/11/hp_prepping_fix_for_latest_ storage_vuln/ July 11, Softpedia – (International) Shadowlock ransomware tells victims to complete survey to unlock their PCs. Symant... read more.

  • July 12, 2013

By Gotham, Posted in Security

July 10, SC Magazine – (International) Microsoft fixes Internet Explorer, .Net Framework, and Silverlight with seven patches. Microsoft’s July 2013 Patch Tuesday release addressed 34 vulnerabilities in Windows, .Net Framework, Internet Explorer, Silverlight, GDI+, and Windows Defender. Source: http://www.scmagazineuk.com/microsoft-fixes-internet-explorer-net-framework-and-silverlight-with-seven-patches/article/302398/ July 10, Softpedia – (International) One critical, four high-risk vulnerabilities fixed... read more.

  • July 11, 2013

By Gotham, Posted in Security

July 10, SC Magazine – (International) Microsoft fixes Internet Explorer, .Net Framework, and Silverlight with seven patches. Microsoft’s July 2013 Patch Tuesday release addressed 34 vulnerabilities in Windows, .Net Framework, Internet Explorer, Silverlight, GDI+, and Windows Defender. Source: http://www.scmagazineuk.com/microsoft-fixes-internet-explorer-net-framework-and-silverlight-with-seven-patches/article/302398/ July 10, Softpedia – (International) One critical, four high-risk vulnerabilities fixed... read more.

  • July 11, 2013