article thumbnail

Even North Korea has an antivirus program—but it’s used for spying

The Parallax

Researchers announced on May 1 that when they inspected the ingredients of the North Korean antivirus software for Windows computers, they found a mix of spyware and old code stolen from an antivirus vendor. How Spain is waging Internet war on Catalan separatists. Jaku is a known spyware-botnet combination, spread over BitTorrent.

Spyware 187
article thumbnail

A Look at the 5 Most Common Types of Cyberattacks

Tenable

Malware: This catch-all term encompasses a number of different cybersecurity threats, including everything from viruses and worms to banking trojans, adware, spyware and ransomware. DoS campaigns can originate from one computer and internet connection or many; the latter are distributed DoS attacks, often coordinated by botnets.

Malware 101
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Fed Tech News Roundup

CTOvision

The following are some of the hot topics in the federal technology ecosystem: Senate advances secret plan forcing Internet services to report terror activity Ars Technica (Today) - Legislation modeled on 2008 law requiring Internet companies to report child porn.The legislation, approved 15-0 in a closed-door hearing, remains "classified."

Spyware 114
article thumbnail

Cybersecurity Snapshot: Tips for cloud configs, MSP vetting, CISO board presentations

Tenable

The Beginner’s Guide to Secure Cloud Configurations ” (Center for Internet Security). The Center for Internet Security (CIS) has released the list of the most prevalent strains of malware making the rounds last month, with Arechclient2, RedLine, and Ursnif making a comeback. ZeuS, a modular banking trojan that uses keystroke logging.

Cloud 52
article thumbnail

What the Cybersecurity Industry Needs to Discuss at the RSA Conference 2020

Palo Alto Networks

A faked recording of a senior executive could order the accounts department to make a financial transaction into a criminal’s bank account. With the growing use of banking apps and touchless payments, smartphones are becoming hubs for financial transactions. DNS is known as the phone book of the internet.

article thumbnail

Technology News and Hot Topics

CTOvision

Rush-hour traffic forces banks to embrace technology. The chief administrative officer of RBS Group is doing so to highlight the way in which customer expectations in the world of banking are changing. “It’s Regin, new computer spyware, discovered by Symantec. Royal Bank of Scotland Fined Million Over Technology Failure.

article thumbnail

The Future of Security

O'Reilly Media - Ideas

Typically, the phisher sends an email that appears to come from a legitimate business—a bank or credit card company—requesting “verification” of information and warning of some dire consequence if it is not provided. For example, a text message claims to be from your bank or credit card company but includes a malicious link.

Mobile 98