Articles In Technology Week in Review

By Eric Corcoran, Posted in Technology Week in Review

Monday 1/21 Malware Evades Detection One Step at a Time The apps were reportedly able to evade detection by using the device's motion sensor data. The malware authors assume that the device is scanning for malware, so they created an emulator with no motion sensors that monitors the user’s steps so that they check for sensor data to determine whether the app is running in a sandbox environment. If it is, the malicious code does not run. If it does run, though, the user receives a fraudulent prompt,... read more.

  • January 25, 2019

By Eric Corcoran, Posted in Technology Week in Review

Monday 1/14 FireEye gears up email security for emerging threats Business email compromise (BEC), which is often cited as the most common way for cyber criminals to infiltrate corporate networks, is a type of scam that targets email accounts of high-level employees related to finance or working with wire transfer payments, either spoofing or compromising them through keyloggers or phishing attacks. http://bit.ly/2M9Dm5V Cryptocurrency mining malware is the number one malware menace – again Crypto... read more.

  • January 18, 2019

By Eric Corcoran, Posted in Technology Week in Review

Monday 1/7 Ursnif, Emotet, Dridex and BitPaymer Malware Families Team Up to Wreak Havoc Given the impact of the Ursnif and Dridex banking Trojans, the ubiquity of Emotet loaders, and the ability of BitPaymer to infiltrate systems via remote desktop and email vectors, this malware interoperability provides evidence that malicious actors are developing their own versions of professional organizations to empower threat evolution. https://ibm.co/2FddCVU Security researchers find over a dozen iPhone apps lin... read more.

  • January 11, 2019

By Eric Corcoran, Posted in Technology Week in Review

Monday 12/10 ESET discovers 21 new Linux malware families In a report published yesterday by cyber-security firm ESET, the company details 21 "new" Linux malware families. All operate in the same manner, as trojanized versions of the OpenSSH client. https://zd.net/2C0PsLp Fileless malware surge, warns Malwarebytes report These attacks and compromises are growing in sophistication and frequency, and are proving to be particularly successful against businesses because the majority of past security soluti... read more.

  • December 14, 2018

By Eric Corcoran, Posted in Technology Week in Review

Monday 12/3 McAfee Labs 2019 Threats Predictions Report We have witnessed greater collaboration among cybercriminals exploiting the underground market, which has allowed them to develop efficiencies in their products. Cybercriminals have been partnering in this way for years; in 2019 this market economy will only expand. The game of cat and mouse the security industry plays with ransomware developers will escalate, and the industry will need to respond more quickly and effectively than ever before. http:... read more.

  • December 10, 2018

By Eric Corcoran, Posted in Technology Week in Review

Monday 11/26 New Linux crypto-miner steals your root password and disables your antivirus This rootkit component has even more intrusive features, experts said, such as "the ability to steal user-entered passwords for the su command and to hide files in the file system, network connections, and running processes." https://zd.net/2TLvkDN Microsoft: Crash-causing Outlook 2010 security patches are now fixed Microsoft this week released KB 4461585 for Outlook 2010, which includes patches for the... read more.

  • November 30, 2018

By Eric Corcoran, Posted in Technology Week in Review

Monday 11/19 Hacking group returns, switches attacks from ransomware to Trojan malware Dubbed tRat by researchers, the malware is predominantly targeting financial institutions and is being distributed with the aim of grabbing credentials, financial data, and other information that would be useful to cyber criminal operations. Researchers also warn that it could have other capabilities that haven't been put into operation yet. https://zd.net/2zijich Major SMS security lapse is a reminder to use authenti... read more.

  • November 23, 2018

By Eric Corcoran, Posted in Technology Week in Review

Monday 11/12 Security Breach at Nordstorm exposed sensitive employee data Seattle-based retailer Nordstrom is notifying employees of an information-security breach that exposed their names, Social Security numbers, dates of birth, checking account and routing numbers, salaries and more. http://bit.ly/2qEYMOs U.S. Cyber Command Shares Malware Samples To Help Thwart Bad Actors In a brief media release, USCYBERCOM stated that it plans to “share unclassified malware samples it has discovere... read more.

  • November 16, 2018

By Eric Corcoran, Posted in Technology Week in Review

This Week in Technology Monday 11/5 Hackers Extracted and Published Facebook Private Messages Grabbed Through Bad Browser Plug-ins The hackers originally published an offer in September for personal information related to 120 million Facebook accounts on a English-language forum. This included a sample of data that the BBC had an expert examine, confirming that over 81,000 profiles’ private messages were included. An additional 176,000 accounts had data that could have been scraped from public Face... read more.

  • November 09, 2018

By Eric Corcoran, Posted in Technology Week in Review

Tuesday 10/30 Because of malware, adware when downloading Google Chrome through Microsoft Edge An investigation by How To Geek revealed that the fake website is actually marked as a “deceptive site” by Google Chrome, but it is not flagged as such by Microsoft Edge and Bing. The Bing search query was reproduced on some systems, not all, but it was only appearing on Microsoft Edge. http://bit.ly/2EOTBoU Nutanix Launches a New Channel Charter to Empower their Partners with Next-generation Techn... read more.

  • November 02, 2018