Category: Blog

Trust in the Cloud: Security-as-a-Service

Trust in the Cloud: Security-as-a-Service You can hardly read the news today without seeing the term “the cloud”. Although the phrase is used frequently in the context of thousands of products and services, it is a somewhat imperfect concept that confuses many. Technology security experts often get asked, “What is

Sophisticated Android ibanking Malware

A variation of the iBanking malware is making its way around Android operating systems. Detected by CYREN’s AntiVirus as Android OS/Agent.HJ, this SMS/spyware collects sensitive data from Android phones, including text messages, phone calls, and recorded audio. The malware has the capability to intercept phone calls and send text messages

Android ransomware punishes porn viewers

Simplocker is ransomware that encrypts files on an infected Android device and then forces the user to pay a ransom fee to decrypt them. The app presents itself as a pornography player – in this case using the name “Sex xonix”. After launching the app a message appears on the

Targeted Financial Phishing Attack Identified and Mitigated by CYREN

CYREN GlobalView Security Lab First to Identify and Mitigate Danske Bank and Swedbank Phishing Attack With the ability to analyze over 12 billion transactions per day on its real-time global infrastructure, CYREN was the first to recognize and stop a targeted phishing attack on customers of the Norwegian and Swedish

Zbot Wants To Energize But International Law Enforcement Says GameOver

We have recently tracked an attack with phony bill payments emails from E.On Energy (eonenergy.com).The attachment is a Zbot Trojan that targets the customers of eonenergy.com to “energize its malicious operation”. Eonenergy.com is one of the UK’s leading power and gas companies. While Zbot can be used for a wide

Wolves of the Wall Street Internet

Where there is money to be made, you can be sure an Internet scammer/spammer will be there. Wall Street is no exception. In the latest pump and dump rendition, scammers acquire a large quantity of an inactive, inexpensive, “bioceutical” penny stock; in this case, 417,00 shares at $0.19 per share,

CYREN Trend Report: Anstieg von Phishing-Angriffen auf PayPal-Nutzer

Im aktuellen CYREN Internet Threats Trend Report stellte das CYREN GlobalView™ Security Lab unter anderem fest, dass die Zahl der Phishing-Angriffe auf Nutzer von PayPal um 73 Prozent gestiegen ist.  Dieser Aufwärtstrend zeigt, dass Cyberkriminelle von weniger rentablen Spam-E-Mails auf einträglichere Angriffe umsteigen. PayPal ist dauerhaft ein beliebtes Ziel solcher

Windows XP: The Final Goodbye

More than one month after Microsoft stopped supporting Windows XP, it is amazing to note that it is still the second most widely used operating system following Windows 7. Based on the data from StatCounter Global Stats it still accounts for approximately 16% market share amongst other desktop (i.e. PC

Exploiting ‘pFragments’ in unpatched MS-Office: Old – But Still Toxic

I still see malware exploiting the CVE-2010-3333 vulnerability even though it’s over a year old. Why do attackers still use this exploit? Mainly because it’s very simple to exploit and many users have still not applied the MS10-087 update (or maybe they are using cracked versions of MS Office). Exploit