Postări

Se afișează postări din septembrie, 2017

CCleaner trojan, I think I'm still having issues

from ransomware-malware-blade http://ift.tt/2xuFsHU via Specialisti Securitate IT in Cluj-Napoca, Romania

Verizon Wireless Internal Credentials, Infrastructure Details Exposed in Amazon S3 Bucket

Verizon is the latest company to leak confidential data through an exposed Amazon S3 bucket. from ransomware-malware-blade http://ift.tt/2yj4OG7 via Specialisti Securitate IT in Cluj-Napoca, Romania

Preventing an Equifax style breach with Symantec WAF

Imagine
Background Image on Blogs "Quilted" Page:  global_technology_0.jpg Publish to Facebook:  No Overview The recent Equifax breach is unfortunately a security risk all companies handling sensitive customer information face.  Details of the recent breach have been made available here . The attack vector at issue here is a widely-known vulnerability in Apache Struts 2 framework, disclosed in early March and drew the attention of many Web Application Firewall (WAF) vendors, including the Symantec WAF – see here . The specific payload does not matter when using CVE-2017-5638 as the vector of attack, as there are several proof of concepts (POCs) available and there are likely thousands of ways to exploit this vulnerability. In our original blogpost, we use one of those POCs to showcase the strength of the Symantec WAF solution for blocking zero-day attacks. What can other companies learn from this? All companies that handle payment card information are subject to PCI D

EternalBlue Exploit Used in Retefe Banking Trojan Campaign

Banking Trojan Retefe is adopting new WannaCry tricks, adding an EternalBlue module to propagate the malware. from ransomware-malware-blade http://ift.tt/2yxzi8u via Specialisti Securitate IT in Cluj-Napoca, Romania

First MWCA was a rousing success!

Imagine
Tens of thousands of attendees converged upon the Moscone Center in San Francisco last week for the first Mobile World Congress Americas (MWCA), a meeting of thought leaders in the mobile world. There were exhibits, press events, booths, demonstrations, lectures, and discussions. In addition to mobile, a big topic on everyone’s mind was cybersecurity for the internet of things (IoT) . With increasingly more household devices becoming “smart” and connected and operated via mobile app, people are realizing the necessity of cybersecurity for everything. from ransomware-malware-blade http://ift.tt/2fgJ0n3 via Specialisti Securitate IT in Cluj-Napoca, Romania

2016 SEC Hack May Have Benefited Insider Trading

The U.S. Securities and Exchange Commission said this week that hackers managed to infiltrate one of its systems last year, something that likely facilitated insider trading. from ransomware-malware-blade http://ift.tt/2ffxKHD via Specialisti Securitate IT in Cluj-Napoca, Romania

Samba Update Patches Two SMB-Related MiTM Bugs

Samba released three security updates, including two related to SMB connections that could be abused by an attacker already on the network to hijack connections and manipulate traffic or data sent from a client. from ransomware-malware-blade http://ift.tt/2xA5nyf via Specialisti Securitate IT in Cluj-Napoca, Romania

What’s New In Android 8.0 Oreo Security

Google’s Android security team has turned a corner with 8.0 Oreo, reducing the attack surface, compartmentalizing components and beefing up protection against rogue apps. from ransomware-malware-blade http://ift.tt/2xWZ4pF via Specialisti Securitate IT in Cluj-Napoca, Romania

Threatpost News Wrap, September 22, 2017

The Equifax data breach saga so far, a Google HTTPS warnings paper, cryptocurrency mining at the Pirate Bay, and bringing machine learning to passwords are all discussed. from ransomware-malware-blade http://ift.tt/2xohdJI via Specialisti Securitate IT in Cluj-Napoca, Romania

Avast Threat Labs analysis of CCleaner incident

Imagine
Experts at Avast Threat Labs have been analyzing the CCleaner advanced persistent threat (APT) continuously for the past few days and apart from the information in recent blog posts ( Piriform and Avast posts),  we are starting a series of technical blog posts describing  details and technical information that we encountered during our analysis. Today, we will cover the ongoing analysis of the CnC server and the 2nd stage payload. from ransomware-malware-blade http://ift.tt/2fl3yyu via Specialisti Securitate IT in Cluj-Napoca, Romania

Progress on CCleaner Investigation

Imagine
Following the take-down of the CnC server and getting access to its data, the Avast Security Threat Labs team has been working around the clock to investigate the source and other details of the recent Piriform CCleaner attack. To recap, the attack affected a total of 2.27M computers between August 15, 2017 and September 15, 2017 and used the popular PC cleaning software CCleaner version 5.33.6162 as a distribution vehicle. Today, we would like to report on the progress so far. from ransomware-malware-blade http://ift.tt/2fcsrsz via Specialisti Securitate IT in Cluj-Napoca, Romania

NotPetya Cost TNT At Least $300 Million

from ransomware-malware-blade http://ift.tt/2yr4Sok via Specialisti Securitate IT in Cluj-Napoca, Romania

Malicious Ad/Click Networks: Common Or Forgotten Threat?

from ransomware-malware-blade http://ift.tt/2xggEnD via Specialisti Securitate IT in Cluj-Napoca, Romania

Data Protection, the Ten Commandments

Imagine
Background Image on Blogs "Quilted" Page:  data-protection-quilt2.png Publish to Facebook:  No Twitter Card Style:  summary Mankind has undergone a massive transformation over the last couple of millennia, yet for much of humanity, 10 simple rules handed down from on high are still pretty effective at producing worthy citizens and a civilized society.  This got me wondering if we could find Ten Commandments for data protection, and this is what I explore in this blog. As organizations continue to evolve through their own digital transformations, data security has become more complex. Good custodians of data are starting to integrate a number of elements in place to keep it safe. Excellent custodians of data are going even further and putting in place integrated systems that bring together technology, process and human behavior.  So here are my 10 Commandments of Data Protection : Know your data If you can’t define what data is sensitive, then obviou

Posting New Request After Running Farbar

from ransomware-malware-blade http://ift.tt/2xx49C7 via Specialisti Securitate IT in Cluj-Napoca, Romania

Suspected Rootkit Causes System Crashes When Running GMER

from ransomware-malware-blade http://ift.tt/2htFfPy via Specialisti Securitate IT in Cluj-Napoca, Romania

C: disk suddenly almost full - insufficient memory to execute tasks

from ransomware-malware-blade http://ift.tt/2fmy5IV via Specialisti Securitate IT in Cluj-Napoca, Romania

Deloitte: ‘Very Few Clients’ Impacted by Cyber Attack

Deloitte, one of the "big four" global accounting firms, admitted it fell victim to a cyber attack last year but downplayed the incident on Monday saying it only affected a few of its high profile clients. from ransomware-malware-blade http://ift.tt/2hqTdlu via Specialisti Securitate IT in Cluj-Napoca, Romania

Android Lockscreen Patterns Less Secure Than PINs

Researchers settle PIN versus pattern debate with study that proves a low-tech hack makes cracking an unlock screen simple. from ransomware-malware-blade http://ift.tt/2xv8iq7 via Specialisti Securitate IT in Cluj-Napoca, Romania

Might be infected please help

from ransomware-malware-blade http://ift.tt/2xBgiaH via Specialisti Securitate IT in Cluj-Napoca, Romania

MS Windows Product Key Removal Guide Didn't Work for me!

from ransomware-malware-blade http://ift.tt/2wSafuH via Specialisti Securitate IT in Cluj-Napoca, Romania

Drive-by mining and ads: The Wild Wild West

Imagine
There seems to be a trend lately for publishers to monetize their traffic by having their visitors mine for cryptocurrencies while on their site. The idea is that you are accessing content for free and in exchange, your computer (its CPU in particular) will be used for mining purposes. The Pirate Bay  started to run a miner on its site  and later publicly acknowledged it. In other cases, the mining was a byproduct of  malicious adverts  or done via legitimate but compromised websites that are being injected with cryptomining code directly . Needless to say, this practice is raising many eyebrows and not everyone is on the same page about whether this new business model could be a long-term replacement for ads (although most people agree that ads are often annoying and malicious). But what exactly happens when publishers turn your PC into a miner and display ads at the same time? In this post, we take a look at what is arguably a bad mix. Drive-by mining Because mining happens in

Additional information regarding the recent CCleaner APT security incident

Imagine
We would like to update our customers and the general public on the latest findings regarding the investigation of the recent CCleaner security incident. As published in our previous blog posts ( here and here ), analysis of the CnC server showed that the incident was in fact an Advanced Persistent Threat (APT) attack, targeting specific high-tech and telecommunications companies. That is, despite the fact that CCleaner is a consumer product, the purpose of the attack was not to attack consumers and their data; instead, the CCleaner customers were used to gain access to corporate networks of select large enterprises. from ransomware-malware-blade http://ift.tt/2ynyq5e via Specialisti Securitate IT in Cluj-Napoca, Romania

Avast now protects Aircel mobile customers

Imagine
At Mobile World Congress Americas last week, we unveiled our new collaboration with Aircel Limited Partners to provide Avast Mobile Security to the Indian network’s 85 million subscribers. Over seventy-five percent of India’s mobile users rely on smartphones as their primary internet source; and at a time when mobile threats are increasing on a worldwide scale , Aircel realized the necessity of safeguarding their customer’s personal information and privacy. They turned to Avast. from ransomware-malware-blade http://ift.tt/2fpoQeC via Specialisti Securitate IT in Cluj-Napoca, Romania

A week in security (September 18 – September 24)

Last week, we kept you updated on our blog about the infected versions of CCleaner that were offered as downloads on the official servers . We also warned you against a fake IRS notice that delivers a customized spying tool , some of the threats currently facing gamers , and a Netflix scam that has been doing the rounds in Europe . Mac users learned how to tell if their Mac is infected and Advanced Tech Support victims learned how to apply for a (partial) refund . Elsewhere: Consumer news The pain caused by the Equifax breach was analyzed in depth by the NY Times. And just as easily Equifax was fooled again . They referred users to a parody site like phishers might have used. Luckily this time it was run by a security researcher. A new twist in ransomware was provided by “ nRansomware ”, a program that locks up your computer and only releases it after you send in 10 nude pictures. The rise in the number of phishing sites has been huge. Almost 1.5 million new phishing sites p

Retefe Banking Trojan Takes Page Out Of WannaCry Playbook

from ransomware-malware-blade http://ift.tt/2ftrekB via Specialisti Securitate IT in Cluj-Napoca, Romania

Chris Vickery on Amazon S3 Data Leaks

Mike Mimoso talks to Chris Vickery of Upguard of the recent rash of Amazon S3 data leaks. from ransomware-malware-blade http://ift.tt/2flK09S via Specialisti Securitate IT in Cluj-Napoca, Romania

Adobe Private PGP Key Leak a Blunder, But It Could Have Been Worse

Adobe suffered at a minimum a PR black eye on Friday when one of its private PGP keys was inadvertently published to its Product Incident Security Response Team (PSIRT) blog. from ransomware-malware-blade http://ift.tt/2xq7S6E via Specialisti Securitate IT in Cluj-Napoca, Romania

Additional information regarding the recent CCleaner APT security incident

Imagine
We would like to update our customers and the general public on the latest findings regarding the investigation of the recent CCleaner security incident. As published in our previous blog posts ( here and here ), analysis of the CnC server showed that the incident was in fact an Advanced Persistent Threat (APT) attack, targeting specific high-tech and telecommunications companies. That is, despite the fact that CCleaner is a consumer product, the purpose of the attack was not to attack consumers and their data; instead, the CCleaner customers were used to gain access to corporate networks of select large enterprises. from ransomware-malware-blade http://ift.tt/2ynyq5e via Specialisti Securitate IT in Cluj-Napoca, Romania

Infection of trojan. System not working well.

from ransomware-malware-blade http://ift.tt/2yAomHb via Specialisti Securitate IT in Cluj-Napoca, Romania

Verizon Wireless Internal Credentials, Infrastructure Details Exposed in Amazon S3 Bucket

Verizon is the latest company to leak confidential data through an exposed Amazon S3 bucket. from ransomware-malware-blade http://ift.tt/2yj4OG7 via Specialisti Securitate IT in Cluj-Napoca, Romania

EternalBlue Exploit Used in Retefe Banking Trojan Campaign

Banking Trojan Retefe is adopting new WannaCry tricks, adding an EternalBlue module to propagate the malware. from ransomware-malware-blade http://ift.tt/2yxzi8u via Specialisti Securitate IT in Cluj-Napoca, Romania

Netflix scam warning

Imagine
Always be on your toes While we are used to receiving scam attempts pretending to be from banks, online shops, credit card companies, and international courier services that does not mean all the other emails are safe. Far from it. To demonstrate this point we will show you a scam aimed at Netflix customers which has been used in the Netherlands and is now doing the rounds in the UK but could just as easily spread to the US. The mail in question The sender address, in this case, was supportnetflix@checkinformation[.]com and the content of the email informs us that there has been a problem with our last payment. Obviously to those of us who are not customers of Netflix this is the first red flag. The fact that the domain name checkinformation[.]com does not belong to Netflix is another big red flag. In fact, the domain is for sale at the moment of writing. Netflix Account disabled! Dear User, We’re having some trouble with your current billing information. We’ll try again. But

2016 SEC Hack May Have Benefited Insider Trading

The U.S. Securities and Exchange Commission said this week that hackers managed to infiltrate one of its systems last year, something that likely facilitated insider trading. from ransomware-malware-blade http://ift.tt/2ffxKHD via Specialisti Securitate IT in Cluj-Napoca, Romania

Samba Update Patches Two SMB-Related MiTM Bugs

Samba released three security updates, including two related to SMB connections that could be abused by an attacker already on the network to hijack connections and manipulate traffic or data sent from a client. from ransomware-malware-blade http://ift.tt/2xA5nyf via Specialisti Securitate IT in Cluj-Napoca, Romania

What’s New In Android 8.0 Oreo Security

Google’s Android security team has turned a corner with 8.0 Oreo, reducing the attack surface, compartmentalizing components and beefing up protection against rogue apps. from ransomware-malware-blade http://ift.tt/2xWZ4pF via Specialisti Securitate IT in Cluj-Napoca, Romania

unable to access files on my computer

from ransomware-malware-blade http://ift.tt/2hnRbm6 via Specialisti Securitate IT in Cluj-Napoca, Romania

Stubborn rootkit on Windows 10

from ransomware-malware-blade http://ift.tt/2wdZinT via Specialisti Securitate IT in Cluj-Napoca, Romania

Definite infection, seeking help

from ransomware-malware-blade http://ift.tt/2xosjkg via Specialisti Securitate IT in Cluj-Napoca, Romania

My PC is infected, need help

from ransomware-malware-blade http://ift.tt/2fpgbsi via Specialisti Securitate IT in Cluj-Napoca, Romania

multiple program processes, two dllhost.exe

from ransomware-malware-blade http://ift.tt/2y0PCSg via Specialisti Securitate IT in Cluj-Napoca, Romania

Automatic startup addition: is this a problem?

from ransomware-malware-blade http://ift.tt/2fpsW6q via Specialisti Securitate IT in Cluj-Napoca, Romania

Very stubborn .exe in Windows/Temp

from ransomware-malware-blade http://ift.tt/2jSHKMd via Specialisti Securitate IT in Cluj-Napoca, Romania

Microsoft Outlook folders not displayed

from ransomware-malware-blade http://ift.tt/2xZ7jS7 via Specialisti Securitate IT in Cluj-Napoca, Romania

PUP.Optional.AmazonBrowserBar, Plugin found: Amazon Assistant for Chrome -

from ransomware-malware-blade http://ift.tt/2xvlRXW via Specialisti Securitate IT in Cluj-Napoca, Romania

CCleaner trojan: how to be sure I'm not infected

from ransomware-malware-blade http://ift.tt/2fHhsIc via Specialisti Securitate IT in Cluj-Napoca, Romania

CCleaner trojan, I think I'm still having issues

from ransomware-malware-blade http://ift.tt/2wN1Dpm via Specialisti Securitate IT in Cluj-Napoca, Romania

CCleaner trojan, I think I'm still having issues

from ransomware-malware-blade http://ift.tt/2xuFsHU via Specialisti Securitate IT in Cluj-Napoca, Romania

Virus alerts

from ransomware-malware-blade http://ift.tt/2wI7QaF via Specialisti Securitate IT in Cluj-Napoca, Romania

Weird-acting Virus infection

from ransomware-malware-blade http://ift.tt/2jR9L6R via Specialisti Securitate IT in Cluj-Napoca, Romania

How do I remove Ad Choices from my computer

from ransomware-malware-blade http://ift.tt/2xl5sGz via Specialisti Securitate IT in Cluj-Napoca, Romania

I am infected with trojan what need to do?

from ransomware-malware-blade http://ift.tt/2yioSZo via Specialisti Securitate IT in Cluj-Napoca, Romania

Malwarebytes keeps detecting "Trojan.Agent" have had Trojan.Coinminer twice

from ransomware-malware-blade http://ift.tt/2xoI090 via Specialisti Securitate IT in Cluj-Napoca, Romania

The Ccleaner virus?

from ransomware-malware-blade http://ift.tt/2ffj77j via Specialisti Securitate IT in Cluj-Napoca, Romania

数据保护十大准则

Imagine
Background Image on Blogs "Quilted" Page:  data-protection-quilt2.png Publish to Facebook:  No 人类在过去几千年里经历了巨大变革,对于人类社会来说,过去传下来的十条简单准则在确保国富民强方面仍非常奏效。 这使我很想知道我们是否能找到十条数据保护的准则,而这就是我们在本博文中所探讨的内容。 随着公司凭借数字化转型而不断演变,数据安全变得更为复杂。负责的数据管理人员开始整合大量相关元素,以保证数据的安全,而优秀的数据管理人员更是创建了各种整合体系,将技术、进程和人类行为相互结合。以下是 数据保护的十条准则 : 了解您的数据 如果您不能确定哪些数据是敏感数据,则明显无法对其进行保护!尽可能利用人才和技术,确保您能识别所有敏感数据。某些数据很容易定义,因此诸如数据丢失预防或云访问安全代理(CASB)等技术可很好地发现这些数据,无论数据是处于固定或移动状态,或是在云端。然而,在融入人为因素之后,一切问题才真正地迎刃而解。这使数据拥有者也可对敏感数据进行标记,因此您在数据整个生命周期内都可对其进行分类。 始终如一地保护属于您的数据 现在您已经对敏感数据有了全面了解,接下来就是确保数据的安全。最好的方法是什么呢?那就是加密。使用数据分类以确定保护需要,这样您便能够依据敏感性级别采用适当的保护方法,避免每次都“重蹈覆辙”。 提供无所不在的保护 不是所有事情都黑白分明,那么您怎么在灰色区域执行保护呢?例如,可以让某些人打开文档,或甚至进行编辑,但却无权打印。将加密技术进行升级,整合数字版权管理,使您具有更高的灵活性和控制力。 给云一线希望 云代表了人类社会最好和最差的一面。云使人们能够开放式协作,展示出人类精神的慷慨大度。但是这种慷慨大度可导致数据被过度分享,损坏了人与人之间的信任。这里有一个更好的方法,那就是基于数据的保护,这样即使在云端,也可确保无论在何处或是由何人来保护数据,慷慨大度的精神始终是一件好事情。 不要让任何人破解您的秘密 解密密钥落入坏人之手将非常危险。您如何控制谁可以访问您的数据呢?与其仅依赖于解密密钥,不如将用户的身份嵌入至进程之中。此外,如果您添加第三维的多因素身份验证,您便可

データ保護の「十戒」

Imagine
Background Image on Blogs "Quilted" Page:  data-protection-quilt2.png Publish to Facebook:  No 人間は、過去数千年の間に大きな変化を遂げてきましたが、人間性の本質はそれほど変わっていません。文明社会と善良な市民を生み出すには、かつて天から与えられた単純な 10 カ条の戒律が、今もなお有効です。 そう考えると、データ保護についても「十戒」をあげることができるのではないか。それが今回のブログのテーマです。 デジタル革命が進むにつれて、データのセキュリティは複雑化の一途をたどっています。適切なデータ管理を考える組織は、データの保護に必要な対策を数多く取り入れ、実施するようになりました。それ以上に優れたデータ管理を考える場合には、テクノロジーとプロセス、人間の行動まで複合した統合的なシステムを運用しています。そうしたことを踏まえて、筆者が考えた 「データ保護の十戒」 をご紹介しましょう。 データを理解すること どのデータが重要かを判断できなければ、データの保護は始まりません。重要なデータを、間違いなくすべて割り出すには、人と技術を総動員する必要があります。なかには定義の簡単なデータもあるので、データ漏えい防止(DLP)やクラウドアクセスセキュリティブローカー(CASB)といった技術さえあれば、保存されたデータでも、移動中あるいはクラウド上のデータでも、識別は万全です。しかし、真の理解を得るためには、人の力を動員しなければなりません。データの所有者が重要なデータにタグ付けしてくれれば、データの存続期間を通じてずっと、データを確実に分類することができます。 必要なデータだけを一貫して保護すること 重要なデータを包括的に把握できたら、それを安全に保護する段階に進みます。一番いいのは、暗号化です。データを分類して保護の必要性を決めておけば、重要度に応じた適切な保護を一貫して適用できるので、「いつも決まった操作を繰り返す」という無駄を省くことができます。 あまねく保護を実施すること ものごとは、白黒が常にはっきりしているわけではありません。だとすれば、その中間にあるグレーな領域はどう保護すればいいのでしょうか。たとえ

Hijacked Software Used To Target Tech Giants

from ransomware-malware-blade http://ift.tt/2xwvqpS via Specialisti Securitate IT in Cluj-Napoca, Romania

unable to access files on my computer

from ransomware-malware-blade http://ift.tt/2hnRbm6 via Specialisti Securitate IT in Cluj-Napoca, Romania

Stubborn rootkit on Windows 10

from ransomware-malware-blade http://ift.tt/2wdZinT via Specialisti Securitate IT in Cluj-Napoca, Romania

Definite infection, seeking help

from ransomware-malware-blade http://ift.tt/2xosjkg via Specialisti Securitate IT in Cluj-Napoca, Romania

My PC is infected, need help

from ransomware-malware-blade http://ift.tt/2fpgbsi via Specialisti Securitate IT in Cluj-Napoca, Romania

multiple program processes, two dllhost.exe

from ransomware-malware-blade http://ift.tt/2y0PCSg via Specialisti Securitate IT in Cluj-Napoca, Romania

Automatic startup addition: is this a problem?

from ransomware-malware-blade http://ift.tt/2fpsW6q via Specialisti Securitate IT in Cluj-Napoca, Romania

Very stubborn .exe in Windows/Temp

from ransomware-malware-blade http://ift.tt/2jSHKMd via Specialisti Securitate IT in Cluj-Napoca, Romania

Microsoft Outlook folders not displayed

from ransomware-malware-blade http://ift.tt/2xZ7jS7 via Specialisti Securitate IT in Cluj-Napoca, Romania

PUP.Optional.AmazonBrowserBar, Plugin found: Amazon Assistant for Chrome -

from ransomware-malware-blade http://ift.tt/2xvlRXW via Specialisti Securitate IT in Cluj-Napoca, Romania

CCleaner trojan: how to be sure I'm not infected

from ransomware-malware-blade http://ift.tt/2fHhsIc via Specialisti Securitate IT in Cluj-Napoca, Romania

CCleaner trojan, I think I'm still having issues

from ransomware-malware-blade http://ift.tt/2wN1Dpm via Specialisti Securitate IT in Cluj-Napoca, Romania

CCleaner trojan, I think I'm still having issues

from ransomware-malware-blade http://ift.tt/2xuFsHU via Specialisti Securitate IT in Cluj-Napoca, Romania

Virus alerts

from ransomware-malware-blade http://ift.tt/2wI7QaF via Specialisti Securitate IT in Cluj-Napoca, Romania

Weird-acting Virus infection

from ransomware-malware-blade http://ift.tt/2jR9L6R via Specialisti Securitate IT in Cluj-Napoca, Romania

How do I remove Ad Choices from my computer

from ransomware-malware-blade http://ift.tt/2xl5sGz via Specialisti Securitate IT in Cluj-Napoca, Romania

I am infected with trojan what need to do?

from ransomware-malware-blade http://ift.tt/2yioSZo via Specialisti Securitate IT in Cluj-Napoca, Romania

Malwarebytes keeps detecting "Trojan.Agent" have had Trojan.Coinminer twice

from ransomware-malware-blade http://ift.tt/2xoI090 via Specialisti Securitate IT in Cluj-Napoca, Romania

The Ccleaner virus?

from ransomware-malware-blade http://ift.tt/2ffj77j via Specialisti Securitate IT in Cluj-Napoca, Romania

May Have Installed CCleaner v5.3 back around 9/5

from ransomware-malware-blade http://ift.tt/2fES7Pe via Specialisti Securitate IT in Cluj-Napoca, Romania

Stubborn rootkit on Windows 10

from ransomware-malware-blade http://ift.tt/2wdZinT via Specialisti Securitate IT in Cluj-Napoca, Romania

Definite infection, seeking help

from ransomware-malware-blade http://ift.tt/2xosjkg via Specialisti Securitate IT in Cluj-Napoca, Romania

Hijacked Software Used To Target Tech Giants

from ransomware-malware-blade http://ift.tt/2xwvqpS via Specialisti Securitate IT in Cluj-Napoca, Romania

My PC is infected, need help

from ransomware-malware-blade http://ift.tt/2fpgbsi via Specialisti Securitate IT in Cluj-Napoca, Romania

Hijacked Software Used To Target Tech Giants

from ransomware-malware-blade http://ift.tt/2xwvqpS via Specialisti Securitate IT in Cluj-Napoca, Romania

multiple program processes, two dllhost.exe

from ransomware-malware-blade http://ift.tt/2y0PCSg via Specialisti Securitate IT in Cluj-Napoca, Romania

Avast now protects Aircel mobile customers

Imagine
At Mobile World Congress Americas last week, we unveiled our new collaboration with Aircel Limited Partners to provide Avast Mobile Security to the Indian network’s 85 million subscribers. Over seventy-five percent of India’s mobile users rely on smartphones as their primary internet source; and at a time when mobile threats are increasing on a worldwide scale , Aircel realized the necessity of safeguarding their customer’s personal information and privacy. They turned to Avast. from ransomware-malware-blade http://ift.tt/2fpoQeC via Specialisti Securitate IT in Cluj-Napoca, Romania

Automatic startup addition: is this a problem?

from ransomware-malware-blade http://ift.tt/2fpsW6q via Specialisti Securitate IT in Cluj-Napoca, Romania

Is my computer infected?

from ransomware-malware-blade http://ift.tt/2wJlkmO via Specialisti Securitate IT in Cluj-Napoca, Romania

Very stubborn .exe in Windows/Temp

from ransomware-malware-blade http://ift.tt/2jSHKMd via Specialisti Securitate IT in Cluj-Napoca, Romania

CCleaner trojan: how to be sure I'm not infected

from ransomware-malware-blade http://ift.tt/2wO3gmo via Specialisti Securitate IT in Cluj-Napoca, Romania

Microsoft Outlook folders not displayed

from ransomware-malware-blade http://ift.tt/2xZ7jS7 via Specialisti Securitate IT in Cluj-Napoca, Romania

PUP.Optional.AmazonBrowserBar, Plugin found: Amazon Assistant for Chrome -

from ransomware-malware-blade http://ift.tt/2xvlRXW via Specialisti Securitate IT in Cluj-Napoca, Romania

CCleaner trojan, I think I'm still having issues

from ransomware-malware-blade http://ift.tt/2wN1Dpm via Specialisti Securitate IT in Cluj-Napoca, Romania

CCleaner trojan, I think I'm still having issues

from ransomware-malware-blade http://ift.tt/2xuFsHU via Specialisti Securitate IT in Cluj-Napoca, Romania

Virus alerts

from ransomware-malware-blade http://ift.tt/2wI7QaF via Specialisti Securitate IT in Cluj-Napoca, Romania

Weird-acting Virus infection

from ransomware-malware-blade http://ift.tt/2jR9L6R via Specialisti Securitate IT in Cluj-Napoca, Romania

How do I remove Ad Choices from my computer

from ransomware-malware-blade http://ift.tt/2xl5sGz via Specialisti Securitate IT in Cluj-Napoca, Romania

I am infected with trojan what need to do?

from ransomware-malware-blade http://ift.tt/2yioSZo via Specialisti Securitate IT in Cluj-Napoca, Romania

Malwarebytes keeps detecting "Trojan.Agent" have had Trojan.Coinminer twice

from ransomware-malware-blade http://ift.tt/2xoI090 via Specialisti Securitate IT in Cluj-Napoca, Romania

The Ccleaner virus?

from ransomware-malware-blade http://ift.tt/2ffj77j via Specialisti Securitate IT in Cluj-Napoca, Romania

May Have Installed CCleaner v5.3 back around 9/5

from ransomware-malware-blade http://ift.tt/2fES7Pe via Specialisti Securitate IT in Cluj-Napoca, Romania

What the actual heck happened? Physical Tampering?

from ransomware-malware-blade http://ift.tt/2hno8LM via Specialisti Securitate IT in Cluj-Napoca, Romania

"Bad image" files and 0 byte .dll's

from ransomware-malware-blade http://ift.tt/2hmir0w via Specialisti Securitate IT in Cluj-Napoca, Romania

Everything is hacked!!

from ransomware-malware-blade http://ift.tt/2hj4m7y via Specialisti Securitate IT in Cluj-Napoca, Romania

3641 warnings

from ransomware-malware-blade http://ift.tt/2xqBmAH via Specialisti Securitate IT in Cluj-Napoca, Romania

Win 7 Ultimate browser redirect persistant after manual removal

from ransomware-malware-blade http://ift.tt/2hjiZYy via Specialisti Securitate IT in Cluj-Napoca, Romania

Verizon Wireless Internal Credentials, Infrastructure Details Exposed in Amazon S3 Bucket

Verizon is the latest company to leak confidential data through an exposed Amazon S3 bucket. from ransomware-malware-blade http://ift.tt/2yj4OG7 via Specialisti Securitate IT in Cluj-Napoca, Romania

How do I remove Ad Choices from my computer

from ransomware-malware-blade http://ift.tt/2xl5sGz via Specialisti Securitate IT in Cluj-Napoca, Romania

EternalBlue Exploit Used in Retefe Banking Trojan Campaign

Banking Trojan Retefe is adopting new WannaCry tricks, adding an EternalBlue module to propagate the malware. from ransomware-malware-blade http://ift.tt/2yxzi8u via Specialisti Securitate IT in Cluj-Napoca, Romania

Netflix scam warning

Imagine
Always be on your toes While we are used to receiving scam attempts pretending to be from banks, online shops, credit card companies, and international courier services that does not mean all the other emails are safe. Far from it. To demonstrate this point we will show you a scam aimed at Netflix customers which has been used in the Netherlands and is now doing the rounds in the UK but could just as easily spread to the US. The mail in question The sender address, in this case, was supportnetflix@checkinformation[.]com and the content of the email informs us that there has been a problem with our last payment. Obviously to those of us who are not customers of Netflix this is the first red flag. The fact that the domain name checkinformation[.]com does not belong to Netflix is another big red flag. In fact, the domain is for sale at the moment of writing. Netflix Account disabled! Dear User, We’re having some trouble with your current billing information. We’ll try again. But

First MWCA was a rousing success!

Imagine
Tens of thousands of attendees converged upon the Moscone Center in San Francisco last week for the first Mobile World Congress Americas (MWCA), a meeting of thought leaders in the mobile world. There were exhibits, press events, booths, demonstrations, lectures, and discussions. In addition to mobile, a big topic on everyone’s mind was cybersecurity for the internet of things (IoT) . With increasingly more household devices becoming “smart” and connected and operated via mobile app, people are realizing the necessity of cybersecurity for everything. from ransomware-malware-blade http://ift.tt/2fgJ0n3 via Specialisti Securitate IT in Cluj-Napoca, Romania

I am infected with trojan what need to do?

from ransomware-malware-blade http://ift.tt/2yioSZo via Specialisti Securitate IT in Cluj-Napoca, Romania

Malwarebytes keeps detecting "Trojan.Agent" have had Trojan.Coinminer twice

from ransomware-malware-blade http://ift.tt/2xoI090 via Specialisti Securitate IT in Cluj-Napoca, Romania

The Ccleaner virus?

from ransomware-malware-blade http://ift.tt/2ffj77j via Specialisti Securitate IT in Cluj-Napoca, Romania

2016 SEC Hack May Have Benefited Insider Trading

The U.S. Securities and Exchange Commission said this week that hackers managed to infiltrate one of its systems last year, something that likely facilitated insider trading. from ransomware-malware-blade http://ift.tt/2ffxKHD via Specialisti Securitate IT in Cluj-Napoca, Romania

Samba Update Patches Two SMB-Related MiTM Bugs

Samba released three security updates, including two related to SMB connections that could be abused by an attacker already on the network to hijack connections and manipulate traffic or data sent from a client. from ransomware-malware-blade http://ift.tt/2xA5nyf via Specialisti Securitate IT in Cluj-Napoca, Romania

What’s New In Android 8.0 Oreo Security

Google’s Android security team has turned a corner with 8.0 Oreo, reducing the attack surface, compartmentalizing components and beefing up protection against rogue apps. from ransomware-malware-blade http://ift.tt/2xWZ4pF via Specialisti Securitate IT in Cluj-Napoca, Romania

NRansom: Ransomware that demands your nudes

Imagine
Ransomware has been called the scourge of the Internet for quite a while. It’s really one of the twenty-first century’s main cyberthreats, and recently it has taken … quite a turn. Researchers from MalwareHunterTeam have discovered a new strain of ransomware , called nRansom, that blocks victims’ computers, but instead of requiring money to unlock the computer, it demands nude photos. This ransomware seems to be not a cryptor, but rather a blocker , which means that in case of infection it doesn’t encrypt your files, but simply blocks access to your computer. The ransom note that appears on the screen informs victims that the only way to get back access to their computers is to send the aforementioned pictures: ten of them, nude, and demonstrably of the victims. They state that they will somehow verify those nudes really belong to the victim before sending the code that unlocks the computer. Not sure about this… 🤔 Sample: https://t.co/EOth6eUZOy @BleepinComputer @demonslay335

Threatpost News Wrap, September 24, 207

The Equifax data breach saga so far, a Google HTTPS warnings paper, cryptocurrency mining at the Pirate Bay, and bringing machine learning to passwords are all discussed. from ransomware-malware-blade http://ift.tt/2waxsc9 via Specialisti Securitate IT in Cluj-Napoca, Romania

May Have Installed CCleaner v5.3 back around 9/5

from ransomware-malware-blade http://ift.tt/2fES7Pe via Specialisti Securitate IT in Cluj-Napoca, Romania

Avast Threat Labs analysis of CCleaner incident

Imagine
Experts at Avast Threat Labs have been analyzing the CCleaner advanced persistent threat (APT) continuously for the past few days and apart from the information in recent blog posts ( Piriform and Avast posts),  we are starting a series of technical blog posts describing  details and technical information that we encountered during our analysis. Today, we will cover the ongoing analysis of the CnC server and the 2nd stage payload. from ransomware-malware-blade http://ift.tt/2fl3yyu via Specialisti Securitate IT in Cluj-Napoca, Romania

Progress on CCleaner Investigation

Imagine
Following the take-down of the CnC server and getting access to its data, the Avast Security Threat Labs team has been working around the clock to investigate the source and other details of the recent Piriform CCleaner attack. To recap, the attack affected a total of 2.27M computers between August 15, 2017 and September 15, 2017 and used the popular PC cleaning software CCleaner version 5.33.6162 as a distribution vehicle. Today, we would like to report on the progress so far. from ransomware-malware-blade http://ift.tt/2fcsrsz via Specialisti Securitate IT in Cluj-Napoca, Romania

Security for an underserved market: SMBs

Imagine
As the company that pioneered easy, affordable, and strong security protection for consumers, we know a few things about security. This month, we had the chance to show how we are bringing this expertise to a market we believe is underserved when it comes to security—small and mid-sized businesses (SMBs). from ransomware-malware-blade http://ift.tt/2xck62I via Specialisti Securitate IT in Cluj-Napoca, Romania

What the actual heck happened? Physical Tampering?

from ransomware-malware-blade http://ift.tt/2hno8LM via Specialisti Securitate IT in Cluj-Napoca, Romania

"Bad image" files and 0 byte .dll's

from ransomware-malware-blade http://ift.tt/2hmir0w via Specialisti Securitate IT in Cluj-Napoca, Romania

Everything is hacked!!

from ransomware-malware-blade http://ift.tt/2hj4m7y via Specialisti Securitate IT in Cluj-Napoca, Romania

3641 warnings

from ransomware-malware-blade http://ift.tt/2xqBmAH via Specialisti Securitate IT in Cluj-Napoca, Romania

Win 7 Ultimate browser redirect persistant after manual removal

from ransomware-malware-blade http://ift.tt/2hjiZYy via Specialisti Securitate IT in Cluj-Napoca, Romania

Data Protection, the Ten Commandments

Imagine
Background Image on Blogs "Quilted" Page:  data-protection-quilt2.png Publish to Facebook:  No Twitter Card Style:  summary Mankind has undergone a massive transformation over the last couple of millennia, yet for much of humanity, 10 simple rules handed down from on high are still pretty effective at producing worthy citizens and a civilized society.  This got me wondering if we could find Ten Commandments for data protection, and this is what I explore in this blog. As organizations continue to evolve through their own digital transformations, data security has become more complex. Good custodians of data are starting to integrate a number of elements in place to keep it safe. Excellent custodians of data are going even further and putting in place integrated systems that bring together technology, process and human behavior.  So here are my 10 Commandments of Data Protection : Know your data If you can’t define what data is sensitive, then obviou

HOLA is For All of Us

Third Party Apps Can't Access Internet

from ransomware-malware-blade http://ift.tt/2wxKTH4 via Specialisti Securitate IT in Cluj-Napoca, Romania

Symantec CEO Greg Clark Points Out Flaws In How Feds Buy Cyber Security

Imagine
Background Image on Blogs "Quilted" Page:  Globe Blog Image.jpg Publish to Facebook:  No Twitter Card Style:  summary Speaking today before an audience at the Center for Cyber & Homeland Security (CCHS) at the George Washington University in D.C., Symantec CEO Greg Clark shared his perspectives and recommendations for strengthening America’s cyber defense.   More specifically, Clark addressed the defects in today’s model, whereby cyber criminals and malicious Nation States can easily discover which security products the U.S. government has purchased, then buy those very same products in order to study how to exploit them in cyberattacks.   Clark proposed the government work with trusted partners to develop mission-specific, custom security products that are protected from discovery and scrutiny by bad actors. In addition, Clark called for a major security research and development effort that would strengthen America’s cyber defenses while spurring i

Thinking Beyond Cloud Security

Imagine
Background Image on Blogs "Quilted" Page:  labs-quilt-image.jpg Publish to Facebook:  No Twitter Card Style:  summary A few years ago, most businesses would have been right to wonder whether their digital work processes would ever be as easy to use as Facebook. But cloud technology has come a long way in a short time.   Cloud services are transforming internal business workloads and processes of countless companies and whole industries like retail, transportation, and even manufacturing. Organizations are able to choose among a variety of intuitive, cloud-based services to find the best fit.     The shared, on-demand nature of cloud computing also means that enterprises need to plan for a host of new security challenges. Fortunately, Symantec and other companies can help with products such as ProxySG, "ProxySG-as-a-Service" in the Cloud (officially  known as Web Security Service , (or WSS), Cloud Access Security Brokers , and the single-sign