FireEye spots crooks using old tricks to avoid detection
A cyber attack that uses Google Docs to avoid detection in order to steal information has been spotted in the wild.
Security firm FireEye reported uncovering the campaign, warning that the crooks are using advanced malware to mount a targeted spear phishing campaign designed to steal corporate and personal data from a variety of victims.
FireEye researcher Chong Rong Hwa wrote: "The FireEye research team has recently identified a number of spear phishing activities targeting Asia and ASEAN [Association of Southeast Asian Nations]. Of these, one of the spear phishing documents was suspected to have used a potentially stolen document as a decoy.
"This malware was found to have used a number of advanced techniques, which makes it interesting. The malware leverages Google Docs to perform redirection to evade callback detection."
In today's technology market, companies are constantly touting the unique and vast benefits of their products, and often times, the consumer is left scratching their heads about who actually has a superior solution.
red star victims In the spirit of last February’s report by Mandiant detailing the exploits of a Chinese-government-linked hacker group, Russian IT security giant Kaspersky Lab today released a report on another sophisticated Chinese...
SUMMARY: Mobile developers, rejoice! New tools and coding protocols -- such as Backend-as-a-Service and Cloud Extend Mobile -- make it easier than ever to deliver enterprise mobile applications in creative, cost-effective ways, writes Michael Facemire. "There's never been a better time to be a mobile developer," he asserts.
As more people engage in various online activities, threats become more prevalent and sophisticated. The basic threat protection we were used to may not be enough to protect us when these new generation risks reach us.
An astounding 80 percent of the world’s population now has a mobile phone—and 84 percent is unwilling to go a single day without their phone. About 45 percent of Americans say they can’t go more than a few hours without checking their phones. In 2012 there were five billion mobile phones in the world—1.8 billion of these were smart phones.
Facebook now reaches 76 percent of the smartphone market, and it accounts for 23 percent of total time spent using apps each month.
The next five most used applications are Google apps, and they account for 10 percent of app usage time. One of the latest smartphone trends is that things are getting less touchy but more sensitive. Gestures and other non-tap inputs are on the rise. Casting a sidelong glance, for example, can pause a video. Some apps are being developed that will switch from manual to voice to text to gesture, depending on what you are doing...
How BYOD brings security risks into corporate networks USA TODAY (Editor's note: In this guest essay, Brian Foster, chief technology officer at advanced threat protection company Damballa, outlines security exposures introduced by the BYOD craze.)...
Within F5's intelligent services framework, the S/Gi firewall can be deployed seamlessly with other network and security capabilities, including solutions for policy enforcement, carrier-grade NAT, and IPv6.
Bromium: A virtualization technology to kill all malware, forever ZDNet Invincea uses host-based virtualization technology on Windows desktops — I believe they actually license a runtime version of Oracle VirtualBox in order to build their product...
1. Executive Summary The FireEye research team has recently identified a number of spear phishing activities targeting Asia and ASEAN.
This malware was found to have used a number of advance techniques which makes it interesting:
- The malware leverages Google Docs to perform redirection to evade callback detection.
- This technique was also found in the malware dubbed “Backdoor.Makadocs” reported by Takashi Katsuki (Katsuki, 2012).It is heavily equipped with a variety of cryptographic functions to perform some of its functions securely.
- The malicious DLL is manually loaded into memory which hides from DLL listing.
A damning, 60-page report released by American computer security firm Mandiant reveals that a 12-story building on the outskirts of Shanghai is most likely the epicenter of ongoing cyber attacks perpetrated against a number of American...
The expanded role of CMOs gives rise to new position titles
SUMMARY: The advent of Big Data driving revenue and the rise of software-as-a-service are two reasons marketers are gaining more corporate power at the expense of ITs. The chief marketing technologist and marketing operating officer positions might emerge from the need to bridge the new gaps between marketing and IT. And the rise of mobile enterprise applications will require sophisticated marketing insight as much as technology solutions, SAP's Eric Lai writes.
Sharing your scoops to your social media accounts is a must to distribute your curated content. Not only will it drive traffic and leads through your content, but it will help show your expertise with your followers.
How to integrate my topics' content to my website?
Integrating your curated content to your website or blog will allow you to increase your website visitors’ engagement, boost SEO and acquire new visitors. By redirecting your social media traffic to your website, Scoop.it will also help you generate more qualified traffic and leads from your curation work.
Distributing your curated content through a newsletter is a great way to nurture and engage your email subscribers will developing your traffic and visibility.
Creating engaging newsletters with your curated content is really easy.