Articles by 'Nancy Rand'

Blog Author - Nancy Rand

Nancy has more than 20 years’ experience in information technology and security, solving business issues and implementing best-practice solutions that support organizational objectives. Her expertise includes leveraging, optimizing, and implementing diverse technology platforms, and management of large-scale technology projects.

By Nancy Rand, Posted in Security

April 20, Softpedia – (International) New PWOBot Python malware can log keystrokes, mine for bitcoin. Security researchers from Palo Alto Networks discovered a new malware family dubbed PWOBot was encoded in Python and PWOBot modules can execute other binaries, launch an Hypertext Transfer Protocol (HTTP) server, log keystrokes, execute custom Python code, query remote Universal Resource Languages (URLs), as well as mine for bitcoins by using the victim’s central processing unit (CPU) or graphics processing... read more.

  • April 21, 2016

By Nancy Rand, Posted in Security

April 19, Softpedia – (International) Pro-ISIS group defaces 88 websites in three-day rampage. A hacking group titled, Team System Dz reportedly hacked and defaced 88 Web sites from France, Israel, the U.K, and the U.S. April 14 – April 16, leaving pro-Islamic State messages on each compromised Web page, many of which were running WordPress systems. Source April 19, SecurityWeek – (International) Google analyzes effectiveness of website hack notifications. Google and the University of California, Berkele... read more.

  • April 20, 2016

By Nancy Rand, Posted in Security

April 18, SecurityWeek – (International) 3.2 million devices exposed to ransomware attacks: Cisco. Security researchers from Cisco Talos discovered that approximately 3.2 million computers were vulnerable to file-encrypting ransomware due to out-of-date software after an Internet scan on already compromised devices revealed that more than 2,100 backdoors across 1,600 Internet Protocol (IP) addresses were associated with governments, schools, aviation companies, and other organizations. Cisco advised adminis... read more.

  • April 20, 2016

By Nancy Rand, Posted in Security

April 15, SecurityWeek – (International) No patches for QuickTime Flaws as Apple ends support on Windows. ZDI reported that Apple will no longer release security updates for Window versions of QuickTime after a security researcher from Source Incite found a heap corruption vulnerability that could allow an attacker to exploit the flaw for remote code execution (RCE) once a victim accesses a maliciously crafted Web site or file. Apple released instructions on ways to remove QuickTime for Window users and adv... read more.

  • April 18, 2016

By Nancy Rand, Posted in Security

April 14, SecurityWeek – (International) Google patches serious account recovery vulnerability. Google released patches addressing several vulnerabilities in its account recovery process after a researcher named “Ramzes” found that attackers could change a user’s password and hijack a user’s account by executing arbitrary code in the context of a help article by specifying a page, which attackers controlled, in an sanitized Universal Resource Language (URL) parameter that could have been exploited when a us... read more.

  • April 15, 2016

By Nancy Rand, Posted in Security

April 13, SecurityWeek – (International) Adobe patches flaws in Creative Cloud, RoboHelp. Adobe released Creative Cloud version 3.6.0.244, which patched an important vulnerability in the sync process that affected Creative Cloud Libraries version 3.5.1.209 and earlier versions, as well as a security hotfix for RoboHelp Server version 9, which patched a critical vulnerability linked to the Structured Query Language (SQL) queries that could lead to information disclosure, among other patched vulnerabilities.... read more.

  • April 14, 2016

By Nancy Rand, Posted in Security

April 12, SecurityWeek – (International) Ramdo Click-Fraud malware continues to evolve. Security researchers from Dell SecureWorks and Palo Alto Networks released an analysis on the Ramdo click-fraud malware, also known as Redyms, which stated that the Ramdo malware was capable of downloading and installing additional malicious software on infected devices after it tricks users into selecting an online ad from other infection systems. The report stated that while the malware was not very sophisticated, its... read more.

  • April 13, 2016

By Nancy Rand, Posted in Security

April 11, Softpedia – (International) Petya ransomware unlocked, you can now recover password needed for decryption. Two security researchers discovered ways to help victims of the Petya ransomware retrieve locked files and unlock computers after one researcher created two Web sites where victims can obtain the decryption password, and another researcher from Emsisoft created a tool that can help generate passwords needed to unlock victims’ computers. Source April 11, SecurityWeek – (International) Nucle... read more.

  • April 12, 2016

By Nancy Rand, Posted in Security

April 7, Softpedia – (International) Security experts crack Dridex admin panel, recover victim data. Security researchers from buguroo reported that they were able to retrieve user data and analyze Dridex’s activity to mitigate future attacks after researchers found the Internet Protocol (IP) address of one of the Dridex admin panels, previously known as Subnet 220, hardcoded in the malicious JavaScript files. The Subnet 220 was running an older version of the Dridex backend that was previously discovered w... read more.

  • April 12, 2016

By Nancy Rand, Posted in Security

April 7, Softpedia – (International) Google reCAPTCHA cracked in new automated attack. Three security researchers developed a new automated attack that can bypass Google’s reCAPTCHA system and Facebook’s CAPTCHAS systems’ security measures and machine learning after solving the systems’ image answers security protocol with a 70.78 percent success rate when conducting studies on 2,235 CAPTCHAs. The new attack proved a higher degree of accuracy than previously reported and could potentially allow malicious ha... read more.

  • April 08, 2016