Odinaff: New Trojan used in high level financial attacks

Multiple banks attacked by Carbanak-linked group. Twitter Card Style:  summary Since January 2016, discreet campaigns involving malware called Trojan.Odinaff have targeted a number of financial organizations worldwide. These attacks appear to be extremely focused on organizations operating in the banking, securities, trading, and payroll sectors. Click to Tweet:  Banks & other financial targets hit by…

Read More

Latest Intelligence for September 2016

The RIG exploit kit was the most active web attack toolkit in September and the number of new malware variants reached its highest point of the last year. Twitter Card Style:  summary The Latest Intelligence page has been refreshed through September 2016, providing the most up-to-date analysis of cybersecurity threats, trends, and insights concerning malware,…

Read More

Latest Intelligence for September 2016

The RIG exploit kit was the most active web attack toolkit in September and the number of new malware variants reached its highest point of the last year. Twitter Card Style:  summary The Latest Intelligence page has been refreshed through September 2016, providing the most up-to-date analysis of cybersecurity threats, trends, and insights concerning malware,…

Read More

Zero Days film puts two Symantec researchers in the spotlight

Alex Gibney's film highlights Eric Chien and Liam O'Murchu's research on Stuxnet and cyberattacks. Twitter Card Style:  summary This summer, we saw the release of Zero Days, a documentary by Oscar-winning director Alex Gibney which examines the impact of cyberattacks perpetrated by countries around the world. As national governments move towards using covert attacks on…

Read More

Zero Days film puts two Symantec researchers in the spotlight

Alex Gibney's film highlights Eric Chien and Liam O'Murchu's research on Stuxnet and cyberattacks. Blog Feature Image:  zero_days_trailer.png Twitter Card Style:  summary This summer, we saw the release of Zero Days, a documentary by Oscar-winning director Alex Gibney which examines the impact of cyberattacks perpetrated by countries around the world. As national governments move towards…

Read More

Android.Lockscreen ransomware now using pseudorandom numbers

The latest Android.Lockscreen variants are using new techniques to improve their chances of obtaining ransom money. Blog Feature Image:  ThinkstockPhotos-503266042.jpg Twitter Card Style:  summary_large_image New variants of Android.Lockscreen are using pseudorandom passcodes to prevent victims from unlocking devices without paying the ransom. read more Source: Symantec

Read More

Android.Lockscreen ransomware now using pseudorandom numbers

The latest Android.Lockscreen variants are using new techniques to improve their chances of obtaining ransom money. Twitter Card Style:  summary_large_image New variants of Android.Lockscreen are using pseudorandom passcodes to prevent victims from unlocking devices without paying the ransom. read more Source: Symantec

Read More

Scammers spoof TaiG, offer fake iOS jailbreak

Scammers are spoofing the popular TaiG jailbreaking site to offer a fake iOS 9.2.1 jailbreak tool that leads to a donation page. Twitter Card Style:  summary With each new iOS release, a large number of users wait eagerly for the corresponding and inevitable jailbreak solution. Although jailbreaking compromises the security of the device, users resort…

Read More

Five ways Android malware is becoming more resilient

Newly observed techniques used by Android malware authors attempt to make things more difficult for victims and security products. Twitter Card Style:  summary Contributors: Tommy Dong, Martin Zhang Recently, a number of new techniques have been discovered that not only help Android malware evade detection but also help it stay installed even when detection has…

Read More

IoT devices being increasingly used for DDoS attacks

Malware is infesting a growing number of IoT devices, but their owners may be completely unaware of it. Twitter Card Style:  summary Malware targeting the Internet of Things (IoT) has come of age and the number of attack groups focusing on IoT has multiplied over the past year. 2015 was a record year for IoT…

Read More