Articles about Security Software

sale

Intel mulls sale of Intel Security – reports

Opinion Intel is reportedly looking to offload its Intel Security arm. The IT giant is investigating options for Intel Security cyber security business, the FT reports. These options include selling off the security software business formerly known as McAfee that the chip-maker bought for $7.7bn back in August 2010. Intel is yet to …
John Leyden, 27 Jun 2016
band_aid_648

Libarchive needs patching again

Users, developers, sysadmins – World+Dog, really – need to get busy patching libarchive, after Cisco Talos researchers turned up three new vulnerabilities. Described here, the bugs all relate to input validation. CVE-2016-4300 is a heap overflow in its handling of 7zip files: a malicious file can cause an integer overflow, …

Man-in-the-middle biz Blue Coat bought by Symantec: Infosec bods are worried

Analysis Symantec’s deal to to buy Blue Coat, the controversial web filtering firm, for $4.65bn will bolster its enterprise security business. But some security experts are concerned about the potential for conflict of interest created by housing Symantec’s digital certificate business and Blue Coat’s man-in-the-middle SSL inspection …
John Leyden, 14 Jun 2016
Blue Coat

Blue Coat readies for IPO

Security company Blue Coat Systems, Inc says that it will soon go public with an initial public offering (IPO). The enterprise security software vendor said that on Thursday it officially handed over paperwork to the US Securities and Exchange Commission to announce its plans to enter the New York Stock Exchange under the …
Shaun Nichols, 03 Jun 2016

It's been a breach-tastic year. And Sophos sales were good, apparently

Operating losses at security software firm Sophos have grown in its first year as a listed company – despite increased sales and an encouraging outlook overall. For the year-ending 31 March 2016, Sophos recorded an operating loss of $32.7 million on revenues of $478.2m. This compares to a loss of $0.5m on revenues of $446.7m …
John Leyden, 26 May 2016
Vlera http://www.shutterstock.com/gallery-2241824p1.html

Compression tool 7-Zip pwned, pain flows to top security, software tools

Some of the world's biggest security and software vendors will be rushing to patch holes in implementations of the popular 7-zip compression tool to stop attackers gaining full control of customer machines. Cisco security researcher Marcin Noga found and reported the holes to the maintainers of the open source 7-Zip platform …
Darren Pauli, 12 May 2016
Broken CD with wrench

Malware scan stalled misconfigured med software, mid-procedure

A user or reseller who couldn't be bothered configuring their antivirus properly has hit the headlines for interrupting doctors trying to insert a vascular catheter into a patient. As the FDA's Adverse Event Report says, an hourly malware scan stalled a Merge Healthcare Hemo unit, which collects patient vital signs, displays …
Hacker with face obscured, wearing a hoodie,  works in front of a bank of monitors. photo by Shutterstock

Finance bods SWIFT to update after Bangladesh hack

Security vendors are pushing for a more comprehensive revamp of the SWIFT international inter-bank financial transaction messaging system beyond a update prompted by an $81m hack against Bangladesh's central bank. The loss of $81m (part of an attempted $950m heist) in February’s Bangladesh cyber-heist – reckoned to be the …
John Leyden, 29 Apr 2016
Gary Kovacs, CEO of AVG. Pic: World Economic Forum

Mobile antivirus sales offset declining search revenues for AVG

The scourge of Android malware is helping to bolster the bottom line of security software firm AVG but the firm still ended up recording a slight decrease in profits. For the first quarter ending 31 March 2016, AVG posted revenues of $107.9m, compared to $102.8m in Q1 2015, a rise of five per cent. Sales from AVG’s emerging …
John Leyden, 28 Apr 2016

Ex-NSA security expert develops generic Mac ransomware blocker

An Apple security expert has developed a free-of-charge standalone ransomware defense tool for OS X. Patrick Wardle, a former NSA staffer who now heads up research at crowdsourced security intelligence firm Synack, has built RansomWhere?, a generic ransomware detector. The utility works by suspending untrusted processes that …
John Leyden, 20 Apr 2016

Halfbreed trojan targets US banks

A new piece of malware has been linked to thefts of $4m from more than 24 American and Canadian banks in just a few days. Researchers at IBM reckon that hackers combined code from two malware types, known as Nymaim and Gozi, to create GozNym, a persistent and powerful trojan. Customers of numerous credit unions and popular e- …
John Leyden, 15 Apr 2016
London - Iconic Red telephone box with Big Ben at the background and blue sky - UK, England. Photo by Shutterstock

Spear phishers target gullible Brits more than anyone else – survey

There’s been a sharp (35 per cent) increase in crypto ransomware attacks, with the UK ranked as the nation third most targeted with ransomware. The UK is also ranked as the most targeted nation for spear phishing attacks and the second most hit-upon country with social media scams, according to other findings from Symantec's …
John Leyden, 12 Apr 2016
Picard frustrated

Half of people plug in USB drives they find in the parking lot

A new study has found that almost half the people who pick up a USB stick they happen across in a parking lot plug said drives into their PCs. Researchers from Google, the University of Illinois Urbana-Champaign, and the University of Michigan, spread 297 USB drives around the Urbana-Champaign campus. They found that 48 …
Shaun Nichols, 11 Apr 2016

Patch out for 'ridiculous' Trend Micro command execution vuln

A bug in its software meant that Trend Micro accidentally left a remote debugging server running on customer machines. The flaw, discovered by Google’s Project Zero researcher Tavis Ormandy, opened the door to command execution of vulnerable systems (running either Trend Micro Maximum Security, Trend Micro Premium Security or …
John Leyden, 31 Mar 2016

Mal Men men hit LiveJournal with Angler exploit kit

Malwarebytes researcher Jerome Segura says malvertisers have served the world's most dangerous exploit kit - Angler - through compromised advertisements run on LiveJournal.com and news service Likes.com. The attacks are the latest in a string of brazen and successful malvertising campaigns that are smashing the web's most …
Darren Pauli, 30 Mar 2016
Riot police in London. Pic: Steve Jackson

Met plod commissioner: Fraud victims should not be refunded by banks

A senior police commissioner has complained that it would be wrong to interpret his comments about preventing online fraud victims from claiming compensation as a proposal for online fraud victims being unable to claim compensation. Sir Bernard Hogan-Howe asserted that the problem was systemic, telling The Times: “The system …

US bank fended off 513 trojans last year alone

The most beleaguered bank in the United States was hit with 513 financial trojans last year, says Symantec threat bod Candid Wueest. The unnamed bank and Symantec customer was in the crosshairs of 78.2 percent of all financial trojans seen by the security firm last year. It is unknown if any of the malware samples gained a …
Darren Pauli, 24 Mar 2016

Police create mega crime database to rule them all. Is your numberplate in it? Could be

The police are to consolidate a number of their large databases into a single "platform" in order to "protect victims and spot potential links to other crimes." The plans for a "National Law Enforcement Data Programme" were announced by the Home Office today and will bring together data from the Police National Computer, …
Kat Hall, 23 Mar 2016

Quadsys Five enter 'not guilty' pleas to Crown court charges

The fraud case against five men from security reseller Quadsys will go to trial in September after they pleaded not guilty to allegations of hacking into a rival’s database to plunder customer and pricing data. The individuals charged include MD Paul Cox, owner Paul Streeter, director Alistair Barnard, account manager Steve …
Paul Kunert, 18 Mar 2016
Hacker with face obscured, wearing a hoodie,  works in front of a bank of monitors. photo by Shutterstock

Is this Romanian man really 'GhostShell'? If so, he risks arrest

Members of the security community are nonplussed by claims that a Romanian hacker “GhostShell” has seemingly risked arrest by doxxing himself in a bid to get a job in information security. The man claiming to be a one-time Anonymous-affiliated hacktivist avoided identification and arrest for four years before apparently outing …
John Leyden, 15 Mar 2016

Samsung PC, laptop owner? Better update the update tool

Users ought to upgrade following the discovery of a flaw in Samsung’s software update tool that opens the door to man-in-the-middle attacks. Security shortcomings in Samsung SW Update Tool, which analyses the system drivers of a computer, were discovered by Core Security. Following the discovery of this vulnerability, Core …
John Leyden, 11 Mar 2016

First OS X ransomware actually a scrambled Linux file scrambler

The world's first fully functional OS X ransomware, KeRanger, is really a Mac version of the Linux Encoder Trojan, according to new research from Romanian security software firm Bitdefender. The infected OS X torrent update carrying KeRanger looks virtually identical to version 4 of the Linux Encoder Trojan that has already …
John Leyden, 09 Mar 2016

Android trojan Triada implants itself into older mobes' 'brains'

Security researchers have discovered a trojan targeting Android devices that can be as complex and functional as Windows-based malware. The Triada trojan is stealthy, modular, persistent and written by professional cybercriminals, according to security researchers at Kaspersky Lab. The trojan can modify outgoing SMS messages …
John Leyden, 03 Mar 2016

Obama administration softens stance on Wassenaar

The Obama administration is revisiting much-criticised 2013 revisions to the Wassenaar Arrangement that made it look like practically any security software is illegal. The State Department had decided in 2013 that “intrusion software” should be included as one of the “dual use” technologies that needed to be controlled under …
fail

Comodo's 'security' kit installed a lame VNC server on PCs on the sly

Google's Project Zero has found yet another blunder in Comodo's internet "security" software – a VNC server enabled by default with a predictable password. Earlier this month, Googler Tavis Ormandy pointed out that Comodo's custom web browser, dubbed Chromodo, was about as unsafe as a lace condom thanks to terrible security …
Iain Thomson, 18 Feb 2016

TalkTalk confesses: Scammers have data about our engineers' visits to your home

A number of TalkTalk customers have had their maintenance visits data breached by fraudsters in an attempt to gain remote access of their computers, it has emerged. One customer, Chris, told The Register that a week after the cyber attack was reported he experienced some issues with his broadband, so TalkTalk sent an engineer …
Kat Hall, 08 Feb 2016

Google ninjas go public with security holes in Malwarebytes antivirus

Malwarebytes is rushing to plug security flaws in its software that allow miscreants to sling malware at its customers. The antivirus firm says it has addressed server-side vulnerabilities that were reported by Google Project Zero researcher Tavis Ormandy in November. However, security holes remain in the client-side software …
John Leyden, 02 Feb 2016
Super-villain Dr Evil puts finger to lip in scheming manner, asks for one million dollars. Pic: New Line Cinema

Lincolnshire council IT ransomware flingers asked for ... £350

Lincolnshire County Council's IT is back up and running after the council shut everything down last week following a ransomware attack in which the attackers turned out to have asked for a mere £350. Despite the BBC reporting that the council had been hit by a £1m ransom, a spokesperson told The Register that it had only been …
Ask Jeeves in gunsights

Oracle to kill off Java browser plugins with JDK 9

Oracle has announced that it will kill off Java browser plugins once JDK 9 debuts. Big Red's post on the matter says it's sniffed the anti-plugin winds and agrees with the idea that plugins are so 90s and have no place in the modern browser, so “developers of applications that rely on the Java browser plugin need to consider …
Simon Sharwood, 28 Jan 2016

Techie on the ground disputes BlackEnergy Ukraine power outage story

Updated A Ukrainian telecoms engineer has raised doubts about the widely reported link between BlackEnergy attacks and power outages in his country. Illia Ilin said that reports suggesting Russian state sponsored hackers used the BlackEnergy malware to infect the control systems of energy distribution utilities and cause blackouts …
John Leyden, 27 Jan 2016

Gotcha: Symantec fires reseller nabbed in tech support scam

An authorised Symantec reseller has been caught hoodwinking users into buying security software by employing underhand marketing tactics. Silurian Tech Support was spotted flinging fake Norton-themed security warnings in an attempt to drum up business by Symantec rival Malwarebytes. The alerts were used to direct users towards …
John Leyden, 22 Jan 2016

HPE smashes champers bottle on side of punter engagement centre

Hewlett Packard Enterprise expects 250 corporate enterprise clients – and incumbent channel partners – to this year unburden their biz challenges at a swanky London-based customer centre. Top brass from the firm today descended on the capital as the ribbons were cut on the Customer Engagement Centre (CEC), an EMEA hub that is …
Paul Kunert, 12 Jan 2016
SHUT UP!

Trend Micro AV gave any website command-line access to Windows PCs

Updated PCs running Trend Micro's Windows antivirus can be hijacked, infected with malware, or wiped clean by any website, thanks to a vulnerability in the security software. The design blunders in the consumer build of Trend's AV were discovered by Google Project Zero bod Tavis Ormandy. A patch is now available to address the remote- …
Iain Thomson, 11 Jan 2016

So what's all this about 320k Time Warner Cable users being hacked?

Watercooler Word is spreading that some 320,000 Time Warner Cable (TWC) customers have had their account information accessed by crooks. America's second-largest cable provider says that the FBI tipped it off to a huge cache of customer login credentials that appears to have been gathered by criminals. TWC told us it is notifying those …
Shaun Nichols, 07 Jan 2016
Headshot of Trojan horse

Microsoft mandates browser-extension defence to malvertising

Microsoft is placing the onus on browser-based security architectures to shield users from malware-laden ads. From March 2016, programs that create ads in browsers and that are served from the Microsoft network will have to use the browsers’ supported extensions to operate. Those building ads must therefore be sure their …
Gavin Clarke, 22 Dec 2015

FireEye flamed: A single email will grant total network access

Researchers at the Google's Project Zero security research team have found a brutal hole in FireEye kit that allows attackers to lay waste to corporate networks with a single email. The flaw, dubbed "666" from its Project Zero vulnerability number, is a passive monitoring hole that respected hacker Tavis Ormandy describes as a …
Darren Pauli, 16 Dec 2015

Web host Moonfruit defies Armada DDoS crew … by (temporarily) defeating itself

Web host Moonfruit last night began putting its systems back online after taking down customers’ sites in order to upgrade defences in the face of a threatened DDoS attack, with the firm blaming a recent assault (which prompted the self-takedown) on the Armada Collective crew. The unusual move of temporarily pulling its own …
John Leyden, 15 Dec 2015

Kaspersky, McAfee, and AVG all vulnerable to major flaw

Some of the biggest names in the security software business have been compromised by a serious flaw that could allow a hacker to use the commercial security code to infiltrate computers. In March, researchers at security firm enSilo found a serious flaw in popular free antivirus engine AVG Internet Security 2015. They found …
Iain Thomson, 10 Dec 2015
US cashpoint. Pic: Tax Credits

Is ATM security threatened by Windows XP support cutoff? Well, yes, but …

Many of the 65,000 ATMs in the UK will become less secure once Microsoft ends extended support for the embedded version of its Windows XP operating system next month, according to security experts. From January 2016, Microsoft will be issuing no further security patches or updates for flavours of Windows still used by the …
John Leyden, 08 Dec 2015

Dailymotion hit by malvertising attack as perpetrators ‘up their game'

Malicious adverts spreading malware managed to make their way onto popular French video streaming site Dailymotion. The infection involved a rogue ad and JavaScript that ultimately directs surfers to sites harbouring the Angler Exploit Kit (EK). The practical upshot was that Windows users running out-of-date software, such as …
John Leyden, 08 Dec 2015

British duo arrested for running malware encryption service

Two British suspects have been arrested accused of running the refud.me encryption site VXers use to evade antivirus. The National Crime Agency says the suspects from Colchester, Essex have been bailed until February next year. The pair operated the refud.me service which allowed VXers to test their malware against antivirus …
Darren Pauli, 24 Nov 2015

We chew over CCS Insight's look into the fu-ture-ture-ture-ture

Analyst outfit CCS Insight's annual crystal ball gazing exercise is always informative and occasionally uncanny, such as when it predicted Three would buy O2, and BT would respond by snapping up EE. This year's predictions are out and full of interesting bits and bobs. For example, you probably knew people are abandoning …
Andrew Orlowski, 23 Nov 2015

Malvertising: How the ad model makes crime pay

Feature The exploitation of online advertising networks by malware-flingers is expected to cause up to $1bn in damages by the end of this year, but despite ongoing regulatory efforts, it is not clear to whom the liability for these enormous losses will fall. The increasingly sophistication with which online advertisers profile users …

Criminal Ruskie BOFHs help hackers steal $790 million in three years

Kaspersky investigation unit boss Ruslan Stoyanov says a Russian cyber scum group of just 20 professional hackers have have made a tidy US$790 million in three years by emptying the world's bank accounts. Stoyanov says some $509 million is thought to have been ripped from the wallets of individuals and businesses from the US, …
Darren Pauli, 23 Nov 2015

Edgy online shoppers face Dyre Christmas as malware mutates

VXers have cooked up Windows 10 and Edge support for the nasty Dyre or Dyreza banking trojan. The banking bomb has ripped untold fortunes from victims and passed them into the hands of its authors. In at least one instance alone IBM says more than one million dollars was plundered from an organisation. At present it has …
Darren Pauli, 19 Nov 2015
spies_648

MPs to assess tech feasibility of requirements under draft surveillance laws

IPB The UK government published a draft Investigatory Powers Bill earlier this month in a bid to close gaps it has said exist in the surveillance powers available to the UK's intelligence and security services. The Science and Technology Committee said that it will carry out a "short inquiry into the technology aspects" of the …
OUT-LAW.COM, 18 Nov 2015

FTC fells four tech-support operations in scammer crackdown

The US Federal Trade Commission (FTC) is cracking down on scammers who fraudulently claim to represent the likes of Microsoft and Apple. The FTC said it has been granted a court order for an asset freeze and an injunction order on four companies who it said were tricking people into paying for unneeded, and in some cases, …
Shaun Nichols, 13 Nov 2015
CoreOS CEO Alex Polvi speaking in May 2015

CoreOS open sources Clair, the vulnerability scanner for your containers

Container-friendly Linux vendor CoreOS has spent the last six months developing a scanning tool that checks for vulnerabilities in containers, and it's open sourcing the code for the whole community. "Our mission is to fundamentally improve the security of the internet," Alex Polvi, CEO of CoreOS, told The Register. "The more …
Iain Thomson, 13 Nov 2015
Android icon desktop toys

Amazon vendors flog thousands of rooted, malware-laden tablets

Amazon is unwittingly acting as the retail channel for thousands of Android devices preloaded with nightmare advertising malware and with operating systems rooted, users and security boffins allege. The blackbox tablets badged under various brands and flogged on the ecommerce site and elsewhere are A$100 (£50) Android units …
Darren Pauli, 13 Nov 2015
hacker

Fraudsters are using you and this Ammyy of malware downloads

Users of Ammyy Admin may have been unwittingly downloading malware along with their remote desktop software. A group called the Buhtrap gang is using the malware to spy on and control its victims’ computers as part of a series of targeted attacks, net security firm ESET warns. The tactics in play show that fraudsters are …
John Leyden, 12 Nov 2015