Tag: Cover
-
Astaroth Spy Trojan Uses Facebook, YouTube Profiles to Cover Tracks
Facebook and YouTube profiles are at the heart of an ongoing phishing campaign spreading the Astaroth trojan, bent on the eventual …
-
TSB Offers to Cover APP Fraud Losses
UK bank TSB has promised to refund any customers that may be hit by so-called “authorized push payment” (APP) fraud, which is on the …
-
Insert Skimmer + Camera Cover PIN Stealer
Very often the most clever component of your typical ATM skimming attack is the hidden pinhole camera used to record customers entering …
-
Cover your NASes: QNAP acknowledges mystery malware but there’s no patch yet
Taiwanese NAS maker QNAP has admitted its devices are affected by mysterious malware that alters files on infected boxen following The …
-
How to Cover Security Holes Left by Edge Computing
Edge computing is beneficial, but it can lead to gaps in security via unpatched devices. Quest Software’s Jennifer LuPiba joined Global …
-
Cover Your pASSword
Thanks to Randall Degges for taking me through Okta’s new PassProtect solution introduced at Oktane18. This is one of several products …
-
10 Costs Your Cyber Insurance Policy May Not Cover
If you handle enterprise security, chances are good you’ve purchased – or at least researched – cyber insurance coverage. After all, it’s …
-
Bankrupt Cancer Clinic Chain’s Insurer to Cover Breach Fine
In an usual move, federal regulators have made arrangements to have a cyber insurer, Beazley Group, cover a $2.3 million HIPAA penalty on …
-
Court Investigating Whether Uber Connived to Cover its Tracks
“You never told me that there was a surreptitious, parallel, nonpublic system that relied upon messages that evaporated after six seconds …
-
Keeping Web Shells Under Cover: An Introduction to Web Shells, Part 3
In Part 2 of this series, we looked at specific examples of web-shells in the PHP programming language. In Part 3 of this series, we’ll be looking at some techniques attackers use to keep we shells hidden. Read full news article on Dzone
●●●