Posts Tagged ‘Malwares’

Malware compromise online payment 2 factor authentication process

New malicious attack have been observed by TrendMicro and targeting Swiss bank customers, Attackers are able to use a sophisticated malware that intercept SMS tokens and change domain name configuration to redirect victims to non legitimate website. This to allow cyber criminal have a full control on victims bank account. The attack start by infecting [...]

Share

Process Hacker 2.32 – Utility to manage Windows process and services

Process hacker is one of the leading tool for manipulating processes and services, this is important for monitoring the changes when you are investigating a malicious code. you will need this tool in your sandbox to identify any new process created during executing the malicious code. Utility provides detailed debugging information for the selected process, [...]

Share
cyber security

Network Security vs. Endpoint Security: Which Matters More?

_Cyber attacks affect 556 million victims per year, which amounts to 1.5 million victims per day and 18 victims per second. When funds are illegally stolen from a business or personal bank account, they’re only recoverable 22 percent of the time. As of 2013, the average global cost of cyber crime is over $100 billion [...]

Share

Beware of the Disassembled Malware Emails

Security software company Symantec is alerting of a new malware that is using a disassembled malicious file to evade antimalware protection. Cybercriminals have created a hidden .dat files attached to the email with a shortcut used to reassemble the malware. When the victim click on the shortcut the computer will start by assembling the .dat [...]

Share

Google Code repository Hosting Trojans

New malware have been discovered by Trendmicro that is hosted on Google Code website. This is a very popular web resource that aims to host open source projects developed by the community. The malware is a java Trojan that downloads banker malware and the project called “flashplayerwindows”. The malware comes to steal sensitive information including [...]

Share

More than 1 Million Victims Used By Rmnet.12 Botnet

After Flashback operation where Doctor Web security software lab reported a 600 thousands infected Apple mac, new press release have been issued to another zombie network which contain more than one million hosts. Win32.Rmnet.12 is the malware used in this attack and it targets windows based operating system to install backdoor and further stealing sensitive [...]

Share

Process Hacker Tool for Manipulating System Services and Processes

Windows operating system contain services and processes, some of them are required for certain tasks or operations other consume the memory without any usage and some are on the system with a malicious intent. To detect and resolve what you are running on your system you can consider Process Hacker very useful tool that will [...]

Share