- Saudi- Aramco continues to investigate cyber attack - Middle East North Africa Financial Network - MENAFN
(MENAFN - Arab News) Saudi Aramco continues to investigate the malicious virus that attacked the oil giant's computer network on Aug. 15. The investigation of this incident is still ongoing, the company said in a statement to the media yesterday. Referring to news reports in some sections of the international and local media regarding the findings of the investigation, Saudi Aramco said We want to emphasize that these reports are not based on real facts. - 7.4billion rogue trader: Trial told of City worker's gamble in UK's biggest banking fraud
- MasterCard announces new EMV liability shift deadline for ATMs
- Reversal of fortune: Attempts to disguise file names
Social engineering tactics are vast and varied, and we see all sorts of methods being used on a daily basis by malware authors, in their attempts to compromise your machine. One such method that we see often is malware being distributed as an alluring or enticing link or file, and we know that some users (that are perhaps not as cautious as they should be) might click on such links, open such file, or accept file transfers from unknown sources… As has been noted previously, the use of Unicode characters such as the Right to Left Override (U+202E) to alter the appearance of a file name, in an attempt to trick the user into clicking on that file, is not new. But that doesn't mean that this method is not used much; actually, we see this happening regularly. - Java zero-day leads to Internet Explorer zero-day | ZDNet
While looking around a compromised server that was being used to exploit Java vulnerabilities, a security researcher stumbled upon another exploit that he claims affects fully patched versions of Microsoft Internet Explorer 7 and 8. Eric Romang found four files on the server: an executable, a Flash Player movie and two HTML files called exploit.html and protect.html When users visit the exploit.html page, it loads the Flash movie, which in turn loads the other HTML page, protect.html. Together, they help drop the executable on to the victim's computer. At this point, attackers have everything they need to drop whatever applications they like on the victim's machine, whether it is to join a botnet or conduct attacks. In this case, the dropper executable installs another program when the victim next logs in.
0 Comments on Links for 2012-09-16 [del.icio.us] as of 1/1/1900
Add a Comment