Another Patch Tuesday is upon us, and both Microsoft and Adobe have important patches that you should implement right away if you’re impacted. Adobe’s big patch fixes a ColdFusion exploit that allows an attacker to access files located on a server with ColdFusion installed.
Finding Similarities and Differences at DEX Level
Some time ago, I analyzed two similar samples of Android/Smsilence.A!tr.spy, a fake Vertu application that spies on its victim. One the samples was targeting a Japanese audience, while the other sample was for Korean end-users
Access Management: Five Tips
Access management is a crucial function for every organization with an Internet connectionand it’s a lot harder these days. The explosion of remote workers and mobile devices has complicated and confused once-rudimentary access management functions, while the popularity of social media and other Web 2.0 sites have added a more challenging dimension to the work environment.
W32/Kryptik.AX!tr – A Masterful FTP Trojan
A few days ago I received an interesting email message: Just your typical phishing email. Normally, I would just dump it into our signature automation processors and move on to the next piece of malicious code.
APTs: One Layer Is Not Enough
One in five security professionals recently surveyed by ISACA say its organization has experienced an advanced persistent threat (APT) attack.
Bitcoin and the ZeroAccess Botnet
Botnets for years have been leveraged as a cybercrime tool to commit any variety of nefarious activity ranging from Website defacement and DDoS to the proliferation of malware and theft of sensitive information. Lately, the cyber community can add one more to the list mining the digital currency Bitcoin.
April 2013 Patch Tuesday Bulletins are now Supported by Desktop Central
Microsoft April 2013 Patch Tuesday bulletins are now supported by Desktop Central. The patch assessment team at Desktop Central has tested the patches and have updated their online patch database on April 10, 2013 at 08:00 EDT
Voices that matter – Identity and Access Management
Lately, the digital identities of users have evolved into playing a significant role in specifying how users interact with computer networks, thus making the IAM programs more and more complex. Identity and Access Management has become one of the most celebrated, and at the same time, dreaded term in IT management. In the present days of cutting-edge technology, IAM has evolved into a branch of science and has been perceived as a very difficult process
Android malware gets phish-y
Last week the security world was abuzz with news of a new attack vector for mobile attacks.
Windows XP-iration
After April 08,2014, the Extended Support for Windows XP will expire and Microsoft will cease to issue any more updates or patches. It will have a significant impact on Windows XP users, particularly in terms of vulnerabilities and exploits. If you just bought a computer recently and it came with a copy of Windows 7 or 8, you don’t need to worry about Microsoft’s Windows XP expiration deadline.