CyActive identified the top five malware that returned the highest ROI for hackers with the least effort per dollar — achieved by recycling code and using the same methods from previous malware attacks to once again inflict damage. All in all, there were 35 reused components in the top five attacks: 1. Snake - Most
Researchers show how to slip malware into Apple’s App Store
A group of researchers from Georgia Tech managed to get a malware-infected app into Apple’s App Store. Here’s how they did it.
Research In Brief: How to Dissect a Journal Article
Here at NARIC, we add about 300 items to our collection each month, and most of these are peer-reviewed research articles from major journals in the field. We asked author and researcher Arielle Si…
Breaking the mould: Why North Korea is unlikely to be behind the WannaCry attack
Ross Rustici provides insight into why North Korea is unlikely to be the answer to the identity of the WannaCry attack.
What a Mac malware attack looks like
Remember last month when I showed you a malware attack that was targeting Google Chrome users? In a follow-up post, I wondered whether Macs would be far behind. Today I found one such attack, in the wild, that directly targets Mac users. Here are the screens to prove it.
How Cybercriminals can Steal Money from Malware-infected ATMs
Cybercrime can mean big money for hackers. According to new reports, malicious hackers are emptying ATMs full of cash. What's the answer to this problem?
Malware and skimmers, explosions and hammers: How attackers go after ATMs
Survey, YouTube offer proof that people are blowing up ATMs to get the cash inside.
Researchers discover data-stealing malware targeting energy sector
Security researchers have discovered an espionage campaign that uses customised malware to steal confidential data from energy firms
ATM Attacks: Why We Must Remain Vigilant
During a recent business trip to San Francisco, ATM security expert John Buzzard stumbled upon an ATM that had been damaged by an explosive substance - a vivid reminder of an emerging threat. Buzzard offers insights on the latest ATM risks.
ATM attacks: How hackers are going for gold
Imagine winning the lottery and having an ATM spit huge amounts of cash at you. That’s exactly what some cyber criminals are after. They’re targeting ATMs and launching “jackpotting” attacks, forcing them to dispense bills like a winning slot machine.
Forget malware, crooks are cracking ATMs the old-fashioned way
Security Think Tank: 10 control areas to mitigate against malware attacks
What strategies should organisations follow to block malware attachments which continue to account for two-thirds of malware infections that result in data breaches?
POS Malware: How to block attacks and boost security
POS malware is breaking through defenses at retailers across the nation -- but why are POS systems so vulnerable? And how can you stop this threat? See 5 reasons why POS malware is winning the battle and 18 ways you can boost POS security to block it. Continue reading →
3 ways to avoid ATM attacks
Jackpotting, skimming, cash traps … what’s a bank to do? Here, experts offer their best criminal-thwarting advice.
Security Think Tank: How to tackle fileless malware attacks
What should organisations do at the very least to ensure business computers are protected from fileless malware?
Here's how to protect your ATMs against new malware
Security research firm Trend Micro has reported that suddenly ATMs are under a new kind of assault. Dubbed Alice by Trend Micro, this malware aims to steal the cash in the ATM. There are ways to defend your ATMs – this very much is a winnable battle – but first recognize that it is a …
ATM jackpotting: How does the Ploutus.D malware work?
After spreading around the world, an ATM jackpotting technique has started popping up across the U.S. Discover how the Ploutus.D malware strain influences ATM jackpotting with expert Nick Lewis.
Researchers Discover New Lean and Mean ATM Malware
Researchers Discover New Lean and Mean ATM Malware. Alice family can clear out cashpoints with ease
Conficker Remains Top Malware by Number of Attacks
Seven years after it emerged, the Confiker worm is the most prominent malware family, trailed by Tinba and Sality, each with 9 percent of recognized attacks.
How to avoid document-based malware attacks
Some 59% of all malicious files detected in the first quarter of 2019 were documents, according to a Barracuda Networks report. Here's how to protect yourself against this growing threat.