Author: tetiana.vashchenko@data443.com

Targeted Financial Phishing Attack Identified and Mitigated by CYREN

CYREN GlobalView Security Lab First to Identify and Mitigate Danske Bank and Swedbank Phishing Attack With the ability to analyze over 12 billion transactions per day on its real-time global infrastructure, CYREN was the first to recognize and stop a targeted phishing attack on customers of the Norwegian and Swedish

Zbot Wants To Energize But International Law Enforcement Says GameOver

We have recently tracked an attack with phony bill payments emails from E.On Energy (eonenergy.com).The attachment is a Zbot Trojan that targets the customers of eonenergy.com to “energize its malicious operation”. Eonenergy.com is one of the UK’s leading power and gas companies. While Zbot can be used for a wide

Wolves of the Wall Street Internet

Where there is money to be made, you can be sure an Internet scammer/spammer will be there. Wall Street is no exception. In the latest pump and dump rendition, scammers acquire a large quantity of an inactive, inexpensive, “bioceutical” penny stock; in this case, 417,00 shares at $0.19 per share,

CYREN Trend Report: Anstieg von Phishing-Angriffen auf PayPal-Nutzer

Im aktuellen CYREN Internet Threats Trend Report stellte das CYREN GlobalView™ Security Lab unter anderem fest, dass die Zahl der Phishing-Angriffe auf Nutzer von PayPal um 73 Prozent gestiegen ist.  Dieser Aufwärtstrend zeigt, dass Cyberkriminelle von weniger rentablen Spam-E-Mails auf einträglichere Angriffe umsteigen. PayPal ist dauerhaft ein beliebtes Ziel solcher

Windows XP: The Final Goodbye

More than one month after Microsoft stopped supporting Windows XP, it is amazing to note that it is still the second most widely used operating system following Windows 7. Based on the data from StatCounter Global Stats it still accounts for approximately 16% market share amongst other desktop (i.e. PC

Exploiting ‘pFragments’ in unpatched MS-Office: Old – But Still Toxic

I still see malware exploiting the CVE-2010-3333 vulnerability even though it’s over a year old. Why do attackers still use this exploit? Mainly because it’s very simple to exploit and many users have still not applied the MS10-087 update (or maybe they are using cracked versions of MS Office). Exploit

NSTIC Pilot for Patient-centered Coordination of Care delivers Health Information Exchange and Privacy via the Trust Network Ecosystem

SAN FRANCISCO, April 1, 2014 /PRNewswire-iReach/ — Resilient Network Systems and its Trust Network ecosystem partners are proud to announce successes from their Patient-centered Coordination of Care (PCC) pilot, funded through the U.S. Department of Commerce as part of the National Strategy for Trusted Identities in Cyberspace (NSTIC). (Source Link) As

Der Gerichtsbescheid – Falsche Vorladung enthält Schadsoftware

Die Gerichtsverhandlung, Der Gerichtsbescheid, Gerichtliche Wiederverhandlung – mit solchen oder ähnlichen Betreffzeilen wird seit ca. 15.00 Uhr deutscher Zeit Malware verschickt. Der Gerichtsbescheid – Verunsicherung soll zum Öffnen des Anhangs verleiten Die E-Mails enthalten eine angebliche Gerichtsvorladung jedoch in fehlerhaftem Deutsch. Als Termin ist morgen (?) der 6.April angegeben. Wie

Android NotCom malware resurfaces (with improvements)

Almost a year ago we reported the emergence of Android “NotCom” malware. Much of the malware was distributed in email links sent from compromised email accounts. What was notable then was the use of the same link to direct users to different destinations based on the visiting device. PC or