New variant of Zeus banking trojan concealed in JPG images

Tuesday, February 18th, 2014

A new variant of the nefarious Zeus banking trojan – dubbed ZeusVM – is concealed in JPG image files, according to the collaborative findings of Jerome Segura, senior security researcher with Malwarebytes, and French security researcher Xylitol. The act is known as steganography – concealing messages or images in other messages or images. In ...

Bogus Evernote alert leads to exploit kit

Monday, February 17th, 2014

Evernote users are being actively targeted with an email spam campaign that tries to trick them into following a malicious link. Sent from [email protected] and titled "Image has been sent", the email pretends to be a notification from Evernote that alerts the user to an image he or she needs to check out, ...

Exploit released for vulnerability targeted by Linksys router worm

Monday, February 17th, 2014

Technical details about a vulnerability in Linksys routers that's being exploited by a new worm have been released Sunday along with a proof-of-concept exploit and a larger than earlier expected list of potentially vulnerable device models. Last week, security researchers from the SANS Institute's Internet Storm Center identified a self-replicating malware ...

Anti-theft Software Could Be Attackers’ Conduit to Millions of PCs

Thursday, February 13th, 2014

A useful cyber-defensive utility can be turned into a powerful tool for cyber-attackers in the form of full access to millions of users' computers, according to research from Kaspersky Lab regarding an element of Absolute Software’s anti-theft software. The focus of the Kaspersky research was the Absolute Computrace agent that resides ...

New IE Zero-Day Found in Watering Hole Attack

Thursday, February 13th, 2014

FireEye Labs has identified a new Internet Explorer (IE) zero-day exploit hosted on a breached website based in the U.S. It’s a brand new zero-day that targets IE 10 users visiting the compromised website–a classic drive-by download attack. Upon successful exploitation, this zero-day attack will download a XOR encoded payload ...