March 9, 2017 SGX Malware Extracts RSA Key in Five Minutes 2 min read - Researchers at Graz University of Technology in Austria developed a novel SGX malware attack that can extract an RSA key in under five minutes.
March 6, 2017 Android Users Must Stay Alert to New Security Flaw 2 min read - A new security flaw and fresh concerns about malware provide further evidence of the need for Android users to remain diligent to external risks.
Malware March 1, 2017 GootKit Developers Dress It Up With Web Traffic Proxy 6 min read - X-Force researchers revealed the cybergang behind Gootkit had upgraded the banking Trojan with new network interception and certificate bypass methods.
Advanced Threats February 28, 2017 Dridex’s Cold War: Enter AtomBombing 9 min read - IBM X-Force researchers discovered that an upgraded version of Dridex has been using a new injection method, signifying the Trojan's continued evolution.
February 23, 2017 Researchers Find Clues in Windows Mirai Botnet Spreader Code 2 min read - Researchers analyzed the code of the Mirai botnet spreader that uses Windows systems as its launching pad to learn more about its origin and functionality.
February 23, 2017 Browser Bully? Malicious Google Chrome Extension Pushes User Buttons 2 min read - A malicious Google Chrome extension is making the rounds to deliver malvertising. Here's how it works and how to avoid getting scammed.
February 22, 2017 New Google Phishing Report: The Lure of Corporate Inboxes 2 min read - A new phishing report from Google Research makes it clear: Corporate inboxes lure the largest number of phishing and malware attacks.
February 16, 2017 GIT Researchers Sink SCADA Security With Proof-of-Concept Malware 2 min read - According to a new report, a team of researchers created proof-of-concept malware that poses a serious threat to SCADA and ICS systems.
Advanced Threats February 15, 2017 The Full Shamoon: How the Devastating Malware Was Inserted Into Networks 6 min read - X-Force IRIS researchers found that the Shamoon malware operators relied on weaponized documents that leveraged PowerShell to infiltrate targeted networks.
Fraud Protection February 15, 2017 Time to Stop Shaming Phishing Victims 2 min read - It is counterproductive to shame phishing victims because it discourages end users from alerting IT professionals of suspicious emails or activity.