IT Security Unplu...
Follow
Find
5.1K views | +0 today
IT Security Unplugged
IT Security news, reviews and blogs: www.itsecurityunplugged.com.
Your new post is loading...
Your new post is loading...
Scooped by IT Security Unplugged
Scoop.it!

Qualys BrowserCheck

Qualys BrowserCheck | IT Security Unplugged | Scoop.it

Qualys BrowserCheck is a free tool that scans your browser and its plugins to find potential vulnerabilities and security holes and helps you fix them.

more...
No comment yet.
Scooped by IT Security Unplugged
Scoop.it!

Infographics : The State of Mobile Malware

Infographics : The State of Mobile Malware | IT Security Unplugged | Scoop.it

With mobile malware becoming an increasing risk, it is important to be educated about the risks and how to protect your mobile device. Check out this helpful infographic created by Bullguard that explains the current state of mobile malware.

more...
No comment yet.
Scooped by IT Security Unplugged
Scoop.it!

SpyEye living up to its name

SpyEye living up to its name | IT Security Unplugged | Scoop.it

Recently, we came across an interesting SpyEye build. It uses well-known spying capabilities of SpyEye like a form grabber, a screenshot sender and an RDP server which allows the criminals to fully remote control the victim’s computer.

more...
No comment yet.
Scooped by IT Security Unplugged
Scoop.it!

SpyEye Trojan delivered via Facebook phishing attacks

SpyEye Trojan delivered via Facebook phishing attacks | IT Security Unplugged | Scoop.it

Classic phishing attacks are used to direct users to rigged Facebook pages that harbor the SpyEye banking Trojan, a long-lived and very effective information stealer that infects Web browsers to hijack online banking sessions.

more...
No comment yet.
Scooped by IT Security Unplugged
Scoop.it!

Google will alert users to DNSChanger malware infection

Google will alert users to DNSChanger malware infection | IT Security Unplugged | Scoop.it
Google is using a clever Domain Name System hack to let people infected with the DNSChanger malware know that they have only a few weeks left before their Internet connection goes dead.
more...
No comment yet.
Scooped by IT Security Unplugged
Scoop.it!

Facebook Phishing attack from sender "Raines"

Facebook Phishing attack from sender "Raines" | IT Security Unplugged | Scoop.it

We are getting reports of a Facebook Spoof that includes various malware attacks. The email is being sent from “Raines”. The Spoof pretends to be coming from Facebook and informs the users to reactivate their account. Right!

more...
No comment yet.
Scooped by IT Security Unplugged
Scoop.it!

Versafe Anti-Trojan Technology

Versafe Anti-Trojan Technology | IT Security Unplugged | Scoop.it

Using layered security, automatic engines and a 24/7 operation center, Versafe efficiently detects computers and smartphones infected with Trojans, attempting to gain access to the organization’s servers.

more...
No comment yet.
Scooped by IT Security Unplugged
Scoop.it!

Stuxnet ≠ cyberwar, says US Army Cyber Command officer

Stuxnet ≠ cyberwar, says US Army Cyber Command officer | IT Security Unplugged | Scoop.it

While “cyber* operations” are becoming an increasing focus of both government and private research, legal frameworks are failing to keep pace, the US Army Cyber Command operational attorney Robert Clark has told the AusCERT security conference in Queensland.

more...
No comment yet.
Scooped by IT Security Unplugged
Scoop.it!

VirusTotal - Free Online Virus, Malware and URL Scanner

VirusTotal is a free virus, malware and URL online scanning service. File checking is done with more than 40 antivirus solutions.
more...
No comment yet.
Scooped by IT Security Unplugged
Scoop.it!

10 Ways To Tighten Up Your Gmail Security

10 Ways To Tighten Up Your Gmail Security | IT Security Unplugged | Scoop.it

Despite what Google does to keep your emails safe, you may still be preyed on by hackers, phishers and scammers from all over the Web.

more...
No comment yet.
Scooped by IT Security Unplugged
Scoop.it!

Cross-browser worm spreads via Facebook, security experts warn

Cross-browser worm spreads via Facebook, security experts warn | IT Security Unplugged | Scoop.it

Malware writers have used Crossrider, a cross-browser extension development framework, to build a click-fraud worm that spreads on Facebook, security researchers from antivirus firm Kaspersky Lab said on Monday.

more...
No comment yet.
Scooped by IT Security Unplugged
Scoop.it!

Work-from-home Scheme and malware served on fake BBC Site

Work-from-home Scheme and malware served on fake BBC Site | IT Security Unplugged | Scoop.it

It’s not uncommon for us to find shady websites that replicate legitimate sites like the BBC, or Channel 5 News in an attempt to advertise fake work-from-home jobs. However, it’s somewhat unusual to find such sites that bring something extra, such as the Blackhole exploit kit and a nasty Trojan.

more...
No comment yet.
Scooped by IT Security Unplugged
Scoop.it!

When Signature-less Security Requires Signatures

When Signature-less Security Requires Signatures | IT Security Unplugged | Scoop.it

For the last few weeks many corporate security teams and CISO’s have been facing the same frustrated, self-induced, Homer Simpson “doh!” experience in face of the Apple Mac Flashback malware outbreaks.

more...
No comment yet.
Scooped by IT Security Unplugged
Scoop.it!

McAfee: Malware increases on all platforms

McAfee: Malware increases on all platforms | IT Security Unplugged | Scoop.it

First-quarter Threat Report finds PC malware at the highest levels in four years, with significant increases on Android and Mac. 

more...
No comment yet.
Scooped by IT Security Unplugged
Scoop.it!

Tatanga Trojan empties online customers' bank accounts

Tatanga Trojan empties online customers' bank accounts | IT Security Unplugged | Scoop.it

Trusteer warns banks that use TAN codes sent via SMS to look out for a sophisticated Trojan capable of emptying the account of an online customer.

more...
No comment yet.
Scooped by IT Security Unplugged
Scoop.it!

Infosecurity - You don’t need to be hacked if you give away your credentials

GFI Software highlights the problems of users’ carelessness with their credentials: who needs hacking skills when log-on details are just handed over?
more...
No comment yet.
Scooped by IT Security Unplugged
Scoop.it!

Trojan.Fraud.A Removal Report

Trojan.Fraud.A Removal Report | IT Security Unplugged | Scoop.it

Trojan.Fraud.A is a Trojan that is involved in the application-based scam, specifically, an application called 'How to Earn Money' which lures Internet users into making money quickly.

more...
No comment yet.
Scooped by IT Security Unplugged
Scoop.it!

Banking Trojan Bypasses Mobile Security with Sophisticated Attack

Researchers at Trusteer have recently observed a new strategy being deployed by the Tatanga Trojan, which uses multiple attack methods in a single scheme. The attack mixes traditional social engineering with browser hijacking in an attempt to fool the victim into legitimately approving wire transfers.

more...
No comment yet.
Scooped by IT Security Unplugged
Scoop.it!

Mobile security researchers present Android Malware Genome Project at IEEE

Mobile security researchers present Android Malware Genome Project at IEEE | IT Security Unplugged | Scoop.it

Android's openness, combined with its popularity, has lead a few of the developer faithful astray -- with malware being a legitimate concern for the mobile operating system.

more...
No comment yet.
Scooped by IT Security Unplugged
Scoop.it!

Now's the time to mobilize your data security.

Now's the time to mobilize your data security. | IT Security Unplugged | Scoop.it
When your data goes mobile, your risk goes up. Today's most serious security threats blend email and web attacks to snag sensitive data. When you add mobile devices with cloud-based apps and free access to social sites, security risks skyrocket.
more...
No comment yet.
Scooped by IT Security Unplugged
Scoop.it!

How Fake Instagram App Spreads Malware on Android Devices

Malware hidden in Android apps is a serious problem raising questions against the credibility of apps that are available for download on the internet. Only a few weeks back, the fake Angry Birds Space game was the center of attention and now this fake Instagram app is making news.
more...
No comment yet.
Scooped by IT Security Unplugged
Scoop.it!

Shopping For Zero-Days: A Price List For Hackers' Secret Software Exploits - Forbes

Shopping For Zero-Days: A Price List For Hackers' Secret Software Exploits - Forbes | IT Security Unplugged | Scoop.it
This story accompanies a profile of the French exploit-selling firm Vupen in the April 9th issue of Forbes magazine. A clever hacker today has to make tough choices.
more...
No comment yet.
Scooped by IT Security Unplugged
Scoop.it!

RSA SecurID software token cloning: a new how-to

RSA SecurID software token cloning: a new how-to | IT Security Unplugged | Scoop.it

A researcher has devised a method attackers with control over a victim's computer can use to clone the secret software token that RSA's SecurID uses to generate one-time passwords.

more...
No comment yet.
Scooped by IT Security Unplugged
Scoop.it!

Worm 2.0, or LilyJade in action

Worm 2.0, or LilyJade in action | IT Security Unplugged | Scoop.it

It is quite rare to analyze a malicious file written in the form of a cross-platform browser plugin.  It is, however, even rarer to come across plugins created using cross-browser engines.

more...
No comment yet.
Scooped by IT Security Unplugged
Scoop.it!

Cybersecurity: How US utilities passed up chance to protect their networks

Cybersecurity: How US utilities passed up chance to protect their networks | IT Security Unplugged | Scoop.it
Cybersecurity needs are not hypothetical, as the recent DHS warning of a cyberattack on the US natural gas industry shows. Why then was a post-9/11 initiative to secure US utilities dropped?
more...
No comment yet.