5.3 billion devices at risk for invisible, infectious Bluetooth attack

Tuesday, September 12th, 2017

What spreads through the air, is invisible to users, and requires no user interaction— no clicking, no pairing, no downloading, not even turning on discoverable mode— but could bring the hurt to billions of devices? It’s an attack vector dubbed Blueborne. Researchers revealed eight different bugs that affect the Bluetooth ...

Hackers Are Using Reddit to Connect 17,000 Macs to a Botnet

Saturday, October 4th, 2014

Bad news for Mac users: You're at risk for an insidious malware that will connect your computer to a botnet. Hackers have developed a backdoor entry called "Mac.BackDoor.iWorm" that gains access to Macs and uses Reddit to connect the hacked computer with a command server. Once the computer is infected, the ...

Massive, undetectable security flaw found in USB: It’s time to get your PS/2 keyboard out of the cupboard

Thursday, July 31st, 2014

Security researchers have found a fundamental flaw that could affect billions of USB devices. This flaw is so serious that, now that it has been revealed, you probably shouldn’t plug a USB device into your computer ever again. There are no known effective defenses against this variety of USB attack, though ...

Word and Excel Files Infected Using Windows PowerShell

Thursday, March 27th, 2014

Malware targeting Word and Excel files has been around for some time, but we recently encountered a new malware family, CRIGENT (also known as “Power Worm”) which brings several new techniques to the table. (We detect these files as W97M_CRIGENT.JER and X97M_CRIGENT.A.) Most significantly, instead of creating or including executable code, CRIGENT uses the ...

Exploit released for vulnerability targeted by Linksys router worm

Monday, February 17th, 2014

Technical details about a vulnerability in Linksys routers that's being exploited by a new worm have been released Sunday along with a proof-of-concept exploit and a larger than earlier expected list of potentially vulnerable device models. Last week, security researchers from the SANS Institute's Internet Storm Center identified a self-replicating malware ...

Page 1 of 1212345...10...Last »