January 14, 2013
Rocra Espionage Malware Campaign Uncovered After Five Years of Activity
For five years, it hid in the weeds of networks used by Eastern European diplomats, government employees and scientific research organizations, stealing data and infecting more machines in an espionage campaign rivaling Flame and others of its ilk. The campaign, called Rocra or Red October by researchers at Kaspersky Lab, focused not only on workstations, but mobile devices and networking gear to gain a foothold inside strategic organizations. Once inside, attackers pivoted internally and stole everything from files on desktops, smartphones and FTP servers, to email databases using exploits developed in China and Russian malware, Kaspersky researchers said.
Image via Securelist

Rocra Espionage Malware Campaign Uncovered After Five Years of Activity

For five years, it hid in the weeds of networks used by Eastern European diplomats, government employees and scientific research organizations, stealing data and infecting more machines in an espionage campaign rivaling Flame and others of its ilk. The campaign, called Rocra or Red October by researchers at Kaspersky Lab, focused not only on workstations, but mobile devices and networking gear to gain a foothold inside strategic organizations. Once inside, attackers pivoted internally and stole everything from files on desktops, smartphones and FTP servers, to email databases using exploits developed in China and Russian malware, Kaspersky researchers said.

Image via Securelist

November 13, 2012

How-To Video: Facebook Privacy

In the previous video in our how-to series, Securing Facebook, we reported that the social networking giant was rapidly approaching one billion active users. Facebook has since surpassed that mark. Considering that, we produced a video detailing and explaining how to implement some simple, built-in features on the world’s largest social network that should help keep your profiles as private as possible.

via Threatpost

October 10, 2012
Spear Phishing Remains Most Difficult Attack to Defend Against
Spear-phishers, like the ones that compromised a White House network last week, are implementing new evasion tactics, fundamentally changing their attack strategies, and revolutionizing the targeted threat model. One of the newer attack strategies is the relatively recent ‘watering hole’ technique, but the changes also include an increased focus on victim behavior, and the adoption of successful tactics used by other factions of the cybercriminal world, specifically scareware and ransomware.
Infographic via Websense

Spear Phishing Remains Most Difficult Attack to Defend Against

Spear-phishers, like the ones that compromised a White House network last week, are implementing new evasion tactics, fundamentally changing their attack strategies, and revolutionizing the targeted threat model. One of the newer attack strategies is the relatively recent ‘watering hole’ technique, but the changes also include an increased focus on victim behavior, and the adoption of successful tactics used by other factions of the cybercriminal world, specifically scareware and ransomware.

Infographic via Websense

September 18, 2012

Securing Your Facebook

Facebook’s active-user count is rapidly approaching one billion. The world’s largest social network, which has long been a popular target and platform for attackers, will only become a more relevant outlet for scams and other fraud as it continues to grow. While the target grows, so too does the need to secure our accounts. With that in mind, we will discuss some simple ways of bolstering the security of our Facebook accounts in the second installment of our how-to video series.

August 14, 2012

Locking Down and Securing Your iPhone

Considering the rapid  proliferation of smartpones and tablets and the vast wealth of personal and financial data many of us store on them, it is increasingly important that we find ways of securing our mobile devices. With that in mind, we decided there was no better way to kick-off a series of security tutorials than with a short step by step video explaining simple ways of securing your iOS device.

Check Threatpost for more original videos moving forward

July 25, 2012

Ted Talk: Your phone company is watching

What kind of data is your cell phone company collecting? Malte Spitz wasn’t too worried when he asked his operator in Germany to share information stored about him. Multiple unanswered requests and a lawsuit later, Spitz received 35,830 lines of code — a detailed, nearly minute-by-minute account of half a year of his life.

 

July 12, 2012

Geographical Visualization of Blacklisted Websites by Hosting Country

Via Zscaler

ZScaler’s Julien Sobrier analyzed the geographical distribution of the top 1,000,000 websites blacklisted by Google Safe Browsing. The first graphic (top) illustrates the distribution by raw numbers and the second (bottom) illustrates the relative distribution (number of blacklisted sites / number of sites hosted).

July 5, 2012
You’re Not as Secure as You Think
Small Business Security Infographic via Veracode
Stay informed with Threatpost’s small and mid-sized business coverage.

You’re Not as Secure as You Think

Small Business Security Infographic via Veracode

Stay informed with Threatpost’s small and mid-sized business coverage.

June 28, 2012
Android Malware: A Threat Rising at a Meteoric Rate
Infographic via Kaspersky Lab
Check out Threatpost’s mobile security coverage for the specifics.

Android Malware: A Threat Rising at a Meteoric Rate


Infographic via Kaspersky Lab


Check out Threatpost’s mobile security coverage for the specifics.

June 15, 2012
A Graph of the Increase in Computer Security Jobs Posted Online
via Forbes

A Graph of the Increase in Computer Security Jobs Posted Online

via Forbes

Liked posts on Tumblr: More liked posts »