Ransomware demands additional payment to delete ‘criminal records’

Wednesday, November 13th, 2013

Back in July 2013, we had discovered a new method of spreading the infamous FBI ransomware by using JavaScript code and iframes to create an illusion that the victim’s browser was locked. After several months, the threat is still very much alive hopping from one domain name to the next. The message is still ...

Linux Back Door Uses Covert Communication Protocol

Wednesday, November 13th, 2013

In May of this year, sophisticated attackers breached a large Internet hosting provider and gained access to internal administrative systems. The attackers appear to have been after customer record information such as usernames, emails, and passwords. While these internal administrative systems had access to customer records, discovery of the attack ...

New mobile exploits demonstrated at Pwn2Own event

Wednesday, November 13th, 2013

At information security conference PacSec 2013 in Tokyo, two teams have accepted rewards for demonstrating exploits against cell phones in the Mobile Pwn2Own 2013 contest sponsored by HP. Japanese squad Team MBSD, of Mitsui Bussan Secure Directions, Inc., collected $40,000 for installing malware and collecting personal data on the Android-powered Samsung Galaxy S4. The group ...

Popular humor site hosted Nuclear Pack exploit kit

Wednesday, November 13th, 2013

Cracked.com, a humor website that is among the 300 most popular sites in the U.S., may have left visitors a sobering surprise this week. According to Barracuda Labs, as of Sunday the website was compromised to host the Nuclear Pack exploit kit. Daniel Peck, principal research scientist on the security team at Barracuda Labs, ...

Deprecation of SHA-1 Hashing Algorithm for Microsoft Root Certificate Program

Wednesday, November 13th, 2013

Microsoft is announcing a policy change to the Microsoft Root Certificate Program. The new policy will no longer allow root certificate authorities to issue X.509 certificates using the SHA-1 hashing algorithm for the purposes of SSL and code signing after January 1, 2016. Using the SHA-1 hashing algorithm in digital ...