Cloud Atlas Hackers Add Polymorphic Malware to Their Toolkit 2 MIN READ | 371 views | 23 February 2020 The hacking group also known as Inception [1, 2] was initially identified in 2014 by Kaspersky's Global Research and Analysis Team researchers, and it has a history of targeting government agencies and entities from a wide range of industries via spear-phishing campaigns. Privacy, Security, Social Media, Technology Read More »
New Malware Miner Sneakily Hides When Task Manager Is Open 1 MIN READ | 514 views | 27 August 2019 Meet “Norman” – a new variant of monero-mining malware that employs crafty tricks to avoid being spotted. After injection, it overwrites its entry in explorer.exe to conceal evidence of its presence. It also stops operating the miner when the PC’s user opens Task Manager (see image below). Re-injecting itself once Task Manager is not running. Case Studies, General, Privacy, Security Read More »
'Agent Smith' Android Malware Infected 25M Devices 2 MIN READ | 309 views | 12 August 2019 The malware disguised itself as the Google Updater and modified apps such as WhatsApp, Opera Mini, and Flipkart with a malicious ads module. A new strain of Android malware has infected 25 million devices and modified legitimate apps with a malicious ads module, according to a report by the security company Check Point. Mobile Security, Privacy, Social Media, Technology Read More »
Houdini Worm targeting commercial banking customers 2 MIN READ | 357 views | 1 August 2019 A new variant of Houdini Worm has been identified targeting commercial banking customers with campaigns containing malicious files. The variant takes five days to actively distribute phishing to victims with the aim of obtaining banking credentials which can be exploited by attackers to make fraudulent purchases. The email attachment contains an MHT file that can be utilised by threat operators in the same way as HTML files. Privacy, Security, Technology Read More »
The Next Big Privacy Hurdle? Teaching AI to Forget 5 MIN READ | 368 views | 30 July 2019 WHEN THE EUROPEAN Union enacted the General Data Protection Regulation (GDPR) a year ago, one of the most revolutionary aspects of the regulation was the “right to be forgotten”—an often-hyped and debated right, sometimes perceived as empowering individuals to request the erasure of their information on the internet, most commonly from search engines or social networks. Privacy, Technology Read More »