The Trojan downloader malware Win32/TrojanDownloader.Agent.QXN that showed up in my email about 10 days ago made a return visit today, posing as a pair of emails from the United States Postal Service. The first time the malware showed up it was dressed up, as a package delivery receipt from Canada Post. But this time the
ResearchExpert content, for researchers by researchers
"Win32/Carberp: When You're in a Black Hole, Stop Digging" aggregates most of our published material on Carberp into a single resource.
An aspect of mobile computing that affects generations unborn...
This article examines the relationship between the Black Hole exploit kit and Win32/Carberp.
I've already mentioned this on the AVIEN blog, as it was an AVIEN member who first drew it to my attention, but a fairly dramatic SQL Injection attack has been flagged by the Internet Storm Center: it appears to resemble the lizamoon attack which was reported as affecting around a million sites earlier in the year.
Citing a “serious lack” of attorney expertise in prosecuting cybercrime, New Jersey Prosecutor John Molinelli decided it was time for attorneys to go back to school. He states, “There was a serious lack of prosecuting attorneys – there’s probably a lack of attorneys, in general, who really know this area,” and decided to do something
Recently we see allegations that CarrierIQ is quietly collecting more information than Android users bargained for. In one case, Trevor Eckhart thinks he proved that they register users’ keystrokes without the users’ knowledge for reasons subject to ongoing speculation. We certainly had no trouble finding the CarrierIQ software on an HTC phone, where it possessed
CSIS have reported a worm that really does spread through Facebook...but it's unsafe to use VirusTotal to compare product detection.
Taking delivery of an unexpected package containing gifts is one of the joys of the holiday season. Missing a package delivery is one of the frustrations of the season. So, an email headed "Failed Package Delivery" is a good way for scam artists and malware distributors to get your attention. In this post I examine
Information and resources regarding tricks used by coldcall/support desk scammers
The FTC has just announced its eight-count deception charge against Facebook has been settled, with the world's largest social network submitting to a wide array of remedies that include 20 years of privacy auditing and strict controls on how the company deals with your personal data in the future. In this post I will explain
Now that the 2011 holiday shopping season is underway we thought it would be helpful to share our tips for safer cyber-shopping in the form of a short video (I think we all know at least a few people who can’t seem to find time to read anything, but are more than happy to watch
"Old hoaxes never die": last year's Christmas Tree App Facebook "virus" warning is circulating again.
Well, not you exactly you, but malls are rolling out technology that tracks customers’ patterns throughout the mall using cell signals. They say they aren’t collecting personal information, but say they want to be able to track customer traffic patterns, for example, how many customers visit Starbucks after visiting Nordstroms. The technology, called FootPath, is
Old hoaxes never die. They just get transplanted to Facebook.
Manipulating search results for trending topics like "Breaking Dawn" and "Taylor Swift" is a nasty phenomenon that is getting nastier, producing fraudulent and potentially costly results in response to innocent searches. As we described in our Search Poisoning video, the goal of this fraud is to trick people into loading web pages that they would
The IRISSCERT conference in Dublin has drawn attention to Irish cybercrime statistics since January 2011.
SCADA, a network-enabled setup for controlling infrastructure, is hitting the headlines in force for falling victim to cyber scammers. There have been several incidents of unauthorized access to Supervisory Control and Data Acquisition (SCADA) systems recently, from guessing simple passwords, to full-on spear phishing attacks against a hardware vendor, which were then used to access
This month we discovered new information on a new modification in the Win32/TrojanDownloader.Carberp trojan family.
Awhile back we noticed signals from the US Pentagon that they were considering the possibility of a traditional military response to cyber attacks on US physical infrastructure. Basically, a cyber attack on infrastructure could be considered an act of war. We now see the official report released, confirming this. The report states, “When warranted, we