2014 Predictions from Symantec
Whispers.The secret to predicting the future is to listen for the whisper.By the time you’ve heard things in a loud, clear voice they have already come true. I’ve been listening to the whispers in 2013...
View ArticleTyphoon Haiyan: Spammers Strike with DHA Attack
Tacloban, the new ground zero created by Haiyan, is the raison d'être for a large directory harvest attack (DHA) launched by spammers today.A DHA attack is launched to check the validity of an email...
View ArticleAll Your Tomcat Are Belong to Bad Guys?
Symantec has discovered a new back door worm-type threat which targets servers running Apache Tomcat. This threat is a little different from the ones we usually encounter every day.Back door type...
View ArticleFake AV Software Updates Are Distributing Malware
Contributor: Joseph GrazianoA new clever way of social engineering spam is going around today that is attempts to trick users into running malware on their computers. The methods malware authors are...
View ArticleSpammers Aim to Ruin Holiday Fete
Contributor: Vivek KrishnamurthiThe holiday season starts in the United States on Thanksgiving on November 28 preceding Black Friday, which occurs on November 29. This also marks the beginning of the...
View ArticleFake AV Software Updates Are Distributing Malware
Contributor: Joseph GrazianoA new clever way of social engineering spam is going around today that attempts to trick users into running malware on their computers. The methods malware authors are using...
View ArticleBlackshades Rat Usage on the Rise Despite Author’s Alleged Arrest
Back in 2012, a key player involved with the prominent Remote Administration Tool (RAT) known as Blackshades RAT was reportedly arrested. Despite his alleged arrest, and with its code leaked in 2010,...
View ArticleIchitaro Vulnerability Successfully Exploited in the Wild
In a previous blog, Symantec reported a new Ichitaro zero-day vulnerability known as the Multiple Ichitaro Products Unspecified Remote Code Execution Vulnerability (CVE-2013-5990). This flaw was being...
View ArticleCyber Monday Shoppers and Retailers Beware of Scams and Attacks
Contributor: Vivek Krishnamurthi December 2, 2013 marks Cyber Monday, the day when Internet retailers expect to experience a major surge in traffic thanks to people shopping online for the holiday...
View ArticleLinux Worm Targeting Hidden Devices
Symantec has discovered a new Linux worm that appears to be engineered to target the “Internet of things”. The worm is capable of attacking a range of small, Internet-enabled devices in addition to...
View ArticleA Winky Face Emoticon Is Not Enough: Man Fined for Facebook Comment
In Switzerland, a judge sentenced a young man to pay a fine for a comment he made on a social network. According to news reports, he felt he didn’t receive a sufficient number of birthday...
View ArticleAttack Exploits Windows Zero-Day Elevation of Privilege Vulnerability
On November 27, Microsoft issued a security advisory regarding the recent discovery of a zero-day vulnerability in a kernel component of Windows XP and Windows Server 2003. The advisory states that the...
View ArticleLook Before You Get Phished This Christmas
The Christmas season is a time to loosen up a few strings. The ‘how’ is obvious, and the ‘where’ is situated in your pocket.Now that’s no joke. You draw your plans and fix your expenditure. After all,...
View ArticleSpammers pay tribute to Paul Walker using ‘Word Salad’
Word Salad, a workaround method invented by spammers to counter Bayesian spam filtering, is an old trick in the spammer’s manual, but cutting edge anti-spam filtering technology has made this ploy...
View ArticleSpamchat: Snapchat Users Subjected to Porn and Secret Admirer Spam
Over the past week, users of the photo messaging application Snapchat have seen an increase in the number of spam snaps (Snapchat pictures). The service is now being infiltrated by a myriad of fake...
View ArticleBitcoin Boom Prompts Flood of Virtual Bank Robberies
The value of Bitcoin has surged dramatically in recent weeks, fuelling fears that a bubble is forming around the virtual currency. As investors pile in, a crash in Bitcoin prices isn’t the only thing...
View ArticleNot a Twitter Experiment: Scammers Capitalize on Twitter Recommendations
Yesterday, a number of Twitter users were duped into following fake Twitter accounts known as @VerifiedReport and @MagicReports. Both accounts claimed to be part of a Twitter experiment between users,...
View ArticleDangerous New Banking Trojan Neverquest Is an Evolution of an Older Threat
There has been recent media coverage around a new online banking Trojan, publicly known as Neverquest. Once Neverquest infects a computer, the malware can modify content on banking websites opened in...
View ArticleCryptolocker Q&A: Menace of the Year
Cybercriminals are constantly looking for ways to evolve their malware. Evolution is the key for survival because antivirus research, analysis, countermeasures, and public awareness thwart the efficacy...
View ArticleCreepware - Who’s Watching You?
Some people stick a piece of tape over the webcam on their laptop, maybe you even do it yourself. Are they over cautious, paranoid, a little strange? Are you? Or is there reason behind this madness?...
View Article