Banking Trojan Dridex Delivered Through Microsoft Word Macros

A change in the distribution method for Dridex banking Trojan has been observed last week, as attackers rely on Microsoft Word documents with malicious macros in order to download the ...

Banking-Trojan-Dridex-Delivered-Through-Microsoft-Word-Macros-463259-2

Keylogging Framework Used by Multiple Actors in Watering-Hole Attacks

A browser-based keystroke interception tool called ScanBox has been observed to be wielded by several threat actors targeting a diverse set of organizations in the US, China, Korea and Japan. Unlike ...

Keylogging-Framework-Used-By-Multiple-Actors-In-Watering-Hole-Attacks-463304-2

Startup Asia Jakarta 2014 digelar 26 – 27 November 2014

Startup Asia Jakarta merupakan acara tahunan Tech In Asia yang mempertemukan pengembang aplikasi, investor, pelajar, media, dan pelaku industri TI akan kembali digelar di tahun 2014 ini. Acaranya akan digelar ...

startup-asia-jakarta-2014

Malvertising Payload Targets Home Routers

A few weeks ago we wrote about compromised websites being used to attack your web routers at home by changing DNS settings. In that scenario the attackers embedded iFrames to ...

Sucuri-Malvertising-Raw-Ad-Payload1

Google Releases Full Android 5.0 Lollipop Software Developer Kit

or the last few months, any Android app maker who wanted to check out the latest version of Google’s mobile operating system had the Android L Developer Preview to play ...

MTI1MzMyNzY2NzM1NzY4MDMw
October - 29 - 2014
Banking-Trojan-Dridex-Delivered-Through-Microsoft-Word-Macros-463259-2

A change in the distribution method for Dridex banking Trojan has been observed last week, as attackers rely on Microsoft Word documents with malicious macros in order to download the malware onto targeted computers. Dridex is the latest evolutionary link of the Feodo/Bugat/Cridex Trojan that developed into Geodo. It preserves the ...

October - 29 - 2014
Keylogging-Framework-Used-By-Multiple-Actors-In-Watering-Hole-Attacks-463304-2

A browser-based keystroke interception tool called ScanBox has been observed to be wielded by several threat actors targeting a diverse set of organizations in the US, China, Korea and Japan. Unlike other tools used in watering-hole attacks, which are built to deliver exploits that would lead to compromising computers of visitors ...

October - 23 - 2014
startup-asia-jakarta-2014

Startup Asia Jakarta merupakan acara tahunan Tech In Asia yang mempertemukan pengembang aplikasi, investor, pelajar, media, dan pelaku industri TI akan kembali digelar di tahun 2014 ini. Acaranya akan digelar pada tanggal 26 hingga 27 November 2014 di Plaza Bapindo, Jakarta. Dalam Startup Asia Jakarta 2014 ini akan terdapat beberapa acara menarik, ...

October - 22 - 2014
Sucuri-Malvertising-Raw-Ad-Payload1

A few weeks ago we wrote about compromised websites being used to attack your web routers at home by changing DNS settings. In that scenario the attackers embedded iFrames to do the heavy lifting, the short fall with this method is they require a website to inject the iFrame. As ...

October - 21 - 2014
MTI1MzMyNzY2NzM1NzY4MDMw

or the last few months, any Android app maker who wanted to check out the latest version of Google’s mobile operating system had the Android L Developer Preview to play with. Now, "L" has taken on a few more letters to become "Lollipop," and on Friday, the full release of ...

October - 16 - 2014
lollipop

We knew it was coming. It had to be. Every one of the last half-dozen or so major builds of Android has gotten a sweetly-themed name — and yet, Google had referred to Android 5.0 as nothing but “L” ever since its debut back at Google I/O. It’s now official: Android ...

October - 15 - 2014
dronecode-examples

The folks who help bring you the Linux operating system today want to bring you better drones tomorrow. The Linux Foundation, which sponsors some development of the widely used operating system, announced the new open-source Dronecode software project. Dronecode brings a formal structure and oversight to two existing open-source drone projects, ...

October - 14 - 2014
BackBox-Linux-4-0-Is-a-Powerful-Penetration-Testing-Operating-System-461968-2

BackBox Linux, an operating system based on Ubuntu that is built to perform penetration tests and security assessments, has finally reached version 4.0. It's been a while since the last BackBox Linux release, which was all the way back in January. The developers decided to rebase the system on Ubuntu 14.04 ...

October - 9 - 2014
hot_certifications-100371759-primary.idge

IT professionals seeking certifications in the coming months may get their best return with cloud and security-related certifications. Agile-related training won’t hurt, either. But there are many other skills that are more likely to be valued by employers than others, according to the most recent quarterly tracking analysis by Foote Partners. ...

October - 8 - 2014
MTIyMjkzMjExOTM3OTMxODc4

Facebook closed its deal to acquire messaging application WhatsApp, which it announced in February in an deal worth $19 billion at the time. The social network received approval from the European Commission on Saturday to move forward with the acquisition, which had been opposed by some European telecommunications companies. The deal ...

  • RSS
  • Delicious
  • Digg
  • Facebook
  • Twitter
  • Linkedin
  • Youtube

Search Site

Popular Posts

Review: The Apple iP

In these times we have little opportunity for mystical religious ...

Everything you need

The iPhone OS 4.0 event just wrapped up and the ...

The end of SQL and r

The road to SQL started with Dr. E.F. Codd's paper, ...

Microsoft Arc Keyboa

I am losing the war on clutter. Apparently my desk ...

John Shepherd-Barron

John Shepherd-Barron, the Scotsman credited with inventing the world's ...

Sponsors