Tag Archives: MalwareMalware

Entrust at RSA: Secure Mobile, Leverage Mobile

February 26, 2013 by Entrust, Inc.     No Comments
This entry is part 4 of 9 in the series Entrust at RSA Conference 2013

During RSA Conference 2013 at Booth 1139 this week, Entrust authentication experts Mike Moir and Mike Byrnes are showing how organizations are able to deploy a two-pronged approach to not only secure mobile identities and transactions, but also leverage mobile devices to secure the online channel.

Eurograbber Proves SMS Not Suited to Secure Bank Transactions

December 12, 2012 by Mike Byrnes     No Comments

Last week, news was released that Eurograbber compromised user PCs and mobile SMS to execute financial fraud at 30 different banks across Europe.

Nitol Malware — Leveraging Dynamic DNS for Nefarious Gains

September 19, 2012 by Jason Soroko     No Comments

A malicious botnet called ‘Nitol’ was interrupted by Microsoft on Sept. 13. ‘Nitol’ was using a Dynamic DNS to enable the infected bot computers to communicate with the hacker’s command and control server. For background, it is possible to serve a website from a home computer, but the difficulty is that your home Internet service [Read More...]

Filed Under: Malware Tagged With: BotnetsBotnets, control server, DNS

The Token Debate: Why the RSA and ISACA Perspectives Are Wrong

September 5, 2012 by Mike Byrnes     No Comments

While I would never claim to be a maven in the world of cyber security, I find it quite disturbing that a long-standing security vendor such as RSA would proclaim, “Since its (one-time-password token) inception, the world’s most respected security researchers have worked, unsuccessfully, to ‘break’ this technology.” Well, I can’t comment on the world’s [Read More...]

Command and Control

July 31, 2012 by Luke Koops     No Comments

I recently attended the Black Hat USA 2012 in Las Vegas. During the conference, I focused my attention on cyberespionage. This involves attackers who are on a mission with well-defined objectives. They are a source of persistent, targeted attacks. I learned a lot about command and control during my training. Command and control — also [Read More...]