You are viewing 'Trojan'

Cybersecurity and Star Wars

May the Fourth Be With You This Star Wars Day

Joseph (JB) Blankenship

May 04, 2015 - Posted by Joseph (JB) Blankenship to Security Insight

One of my strongest childhood memories was the night that I saw Star Wars for the first time. My father has always been a bit of a science fiction nut, and he was excited about the movie and couldn’t wait to see it. At the time, we lived in a small town named Monroeville in Southwest Alabama. The town didn’t have a movie theater. It had burned down years before we moved there and was never rebuilt. We could only get three channels on the TV, if the weather was cooperating.

You have to understand that we weren’t on the bleeding edge of entertainment at that point. We barely knew what was happening in the outside world. Therefore, my mother and I were all but oblivious to the Star Wars hysteria that was beginning to sweep the country in the summer of 1977.

Nevertheless, at my father’s insistence, we loaded up in the car and drove to the closest movie theater that had Star Wars playing – a drive-in theater in Brewton, AL about 45 miles... read more >

The Incredibly Problematic Scourge: RANSOMWARE

Bryan Pasquale

February 10, 2015 - Posted by Bryan Pasquale to Security Insight


By now, most everyone has heard of the malware boogeyman known as ransomware. This is a type of malware that an end-user finds on a system after clicking a link with a malicious program or Trojan horse. Ransomware makes no secret of its presence on your machine. Similar to keystroke loggers, the focus is on you and your data.

How does ransomware work?

Ransomware restricts access to an infected computer and, as the nomenclature suggests, demands a ransom payable to the program creator in order to release control of the computer back to the... read more >

Malware Detection with File Integrity Monitoring

Jeremy Nichols

January 08, 2015 - Posted by Jeremy Nichols to Security Insight

File Integrity Management

In April, I wrote a blog about expanding the use of File Integrity Monitoring (FIM) with a focus on security, in addition to compliance. Now, I am doing a follow-up on this idea, diving into actual use cases where FIM can be leveraged to detect malicious files or code.

The goal of this is not to point to FIM as a stand-alone malware solution, but to outline that it has some untapped potential in this realm and can supplement traditional endpoint security solutions such as anti-virus or anti-malware applications.

There are a plethora of commercial and free FIM solutions available including Samhain, Tripwire and OSSEC. Due to cost and complexity, an enterprise-level file integrity monitoring solution may not always be an option for small to medium-sized businesses.

For the... read more >

Web Searches Provide Nude Celebrity Photos AND Malware Too

Leaked Celebrity Photos are an Invasion of Privacy, Making the Internet Less Safe

Jon-Louis Heimerl

September 02, 2014 - Posted by Jon-Louis Heimerl to Security Insight


So, most people do not want to get malware on their computers, right?

Most users do not want to visit hostile sites and get compromised, get their information stolen and act as a leak into their organization’s infrastructure.

You would think so.

But since last Sunday, August 31, consider the impact that just a couple little searches are going to have on the security of the Internet.

Go Google “Jennifer Lawrence nude” and “Kate Upton nude."

Well, actually, DON'T DO THAT!

No, just don’t. Here are three good reasons those searches are not a good idea:

  1. The nude pictures were stolen. As far as we know, they...
read more >

Not Just Another ZeuS Clone – Enter Dyreza

Chad Kahl

June 19, 2014 - Posted by Chad Kahl to Threat Intelligence

New malware is never a good thing. As a security researcher however, it is more interesting when the bad guys take the initiative to develop new code instead of continually cloning a “successful” package. While following a malicious Dropbox campaign, researchers at PhishMe have discovered a new banking Remote Access Trojan (RAT) targeting the customers of many major banks.

Online banking users have something new to be wary of, while we have new things to investigate and protect our clients against.

Titled “Dyreza” or “Dyre,” this Trojan uses a technique known as “browser hooking” to defeat SSL and two-factor authentication efforts in Internet Explorer, Chrome and Firefox, then operates in a Man... read more >

Voted one of the Best Computer Security Blogs 2016
NTT Security (US), Inc. (formerly Solutionary) is a security consulting and managed security services provider. The NTT Security blog is a place for IT professionals to both learn and talk about the latest in IT security and compliance.

Get the NTT Security Blog delivered to your inbox!

Enter your Email:

(We will not share your email or use it for anything else.)