Macro Malware Returns with a Vengeance, Infecting Half a Million PCs

Thursday, April 30th, 2015

Macro malware, that tried-and-true document-borne attack vector, is back. Over the past few months, Microsoft has seen an increasing macro downloader trend that affects nearly 501,240 unique machines worldwide. The majority of the macro-malware attacks have taken place in the United States and United Kingdom. Macro malware gets into your ...

Google Aims at Phishing with Password Alert

Wednesday, April 29th, 2015

Phishing pages are tricky by nature: they look like standard login pages, but are actually faux sites run by people looking to receive and steal passwords. Google is taking steps to thwart this common and dangerous trap with its Password Alert service. Password Alert is an open-source Chrome extension that ...

New fileless malware found in the wild

Tuesday, April 21st, 2015

Since the discovery of the Poweliks fileless Trojan in August 2014, researchers have been expecting other similar malware to pop up. The wait is over: Phasebot malware, which also has fileless infection as part of its routine, is being sold online. "Unlike most malware, fileless malware hides itself in locations that are ...

Researchers identify attack technique, all Windows versions at risk

Monday, April 13th, 2015

Researchers with Cylance have identified a new attack technique – built on a vulnerability identified nearly 20 years ago by Aaron Spangler – that can enable the theft of user credentials from PCs, tablets and servers running any version of Windows, according to a Monday post by Cylance. The “Redirect to ...

No Backdoors in Truecrypt, Finds Code Review

Tuesday, April 7th, 2015

A long-awaited code review of encryption service Truecrypt has finally been completed, with the good news being that there are no deliberate backdoors in the “relatively well-designed” piece of software. Cryptographic expert Matthew Green revealed the news in a blog post last week, claiming that the NCC Crypto Services group had found “no ...