You are viewing 'Trojan'
May the Fourth Be With You This Star Wars Day
One of my strongest childhood memories was the night that I saw Star Wars for the first time. My father has always been a bit of a science fiction nut, and he was excited about the movie and couldn’t wait to see it. At the time, we lived in a small town named Monroeville in Southwest Alabama. The town didn’t have a movie theater. It had burned down years before we moved there and was never rebuilt. We could only get three channels on the TV, if the weather was cooperating.
You have to understand that we weren’t on the bleeding edge of entertainment at that point. We barely knew what was happening in the outside world. Therefore, my mother and I were all but oblivious to the Star Wars hysteria that was beginning to sweep the country in the summer of 1977.
Nevertheless, at my father’s insistence, we loaded up in the car and drove to the closest movie theater that had Star Wars playing – a drive-in theater in Brewton, AL about 45 miles... read more >
By now, most everyone has heard of the malware boogeyman known as ransomware. This is a type of malware that an end-user finds on a system after clicking a link with a malicious program or Trojan horse. Ransomware makes no secret of its presence on your machine. Similar to keystroke loggers, the focus is on you and your data.
How does ransomware work?
Ransomware restricts access to an infected computer and, as the nomenclature suggests, demands a ransom payable to the program creator in order to release control of the computer back to the... read more >
In April, I wrote a blog about expanding the use of File Integrity Monitoring (FIM) with a focus on security, in addition to compliance. Now, I am doing a follow-up on this idea, diving into actual use cases where FIM can be leveraged to detect malicious files or code.
The goal of this is not to point to FIM as a stand-alone malware solution, but to outline that it has some untapped potential in this realm and can supplement traditional endpoint security solutions such as anti-virus or anti-malware applications.
There are a plethora of commercial and free FIM solutions available including Samhain, Tripwire and OSSEC. Due to cost and complexity, an enterprise-level file integrity monitoring solution may not always be an option for small to medium-sized businesses.
For the... read more >
Leaked Celebrity Photos are an Invasion of Privacy, Making the Internet Less Safe
So, most people do not want to get malware on their computers, right?
Most users do not want to visit hostile sites and get compromised, get their information stolen and act as a leak into their organization’s infrastructure.
You would think so.
But since last Sunday, August 31, consider the impact that just a couple little searches are going to have on the security of the Internet.
Go Google “Jennifer Lawrence nude” and “Kate Upton nude."
Well, actually, DON'T DO THAT!
No, just don’t. Here are three good reasons those searches are not a good idea:
- The nude pictures were stolen. As far as we know, they...
New malware is never a good thing. As a security researcher however, it is more interesting when the bad guys take the initiative to develop new code instead of continually cloning a “successful” package. While following a malicious Dropbox campaign, researchers at PhishMe have discovered a new banking Remote Access Trojan (RAT) targeting the customers of many major banks.
Online banking users have something new to be wary of, while we have new things to investigate and protect our clients against.
Titled “Dyreza” or “Dyre,” this Trojan uses a technique known as “browser hooking” to defeat SSL and two-factor authentication efforts in Internet Explorer, Chrome and Firefox, then operates in a Man... read more >