News

2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008
January 13, 2017

They include the main sections of their suite -- Skype, Office, Xbox are all accessible -- but they don't have full integration. For example, clicking on Skype will just send you to you Skype and leave you there and clicking Office Trust Center will send you to the help page of the Office Trust Center," Harmer told SearchSecurity via email. "While not ideal, this setup is better than nothing as it reminds you that you have different places to deal with privacy for each of the components.

January 12, 2017

Der Internet-Security-Spezialist Zscaler hat nun in seiner Security Cloud die Gefahrensituation untersucht, die von IoT-Geräten seiner Kunden ausgeht, deren Traffic durch die Zscaler-Cloud läuft. Die zweimonatige Analyse von August bis Oktober verfolgte darüber hinaus das Ziel herauszufinden, ob diese Geräte in die prominenten DDoS-Attacken dieser Monate involviert waren. Die Untersuchung konzentrierte sich vor allem auf die Faktoren Gerätetyp, genutzte Protokolle der Geräte, Lokation der Server mit denen kommuniziert wird und die Häufigkeit der In- und Outbound-Kommunikation.

January 11, 2017

Zscaler also reports about this modus, knowing that Android users are eagerly waiting for "Super Mario Run," the Trojan malware will attempt to present a fake web page promoting its release. Some details of the malware are cited in their report.

January 09, 2017

The malware targets all the financial apps on a users’ device. When they use them they are presented with a fake login screen that captures their details. In the Zscaler blog, Ghandi lists the finance apps the malware targets. It includes the Android apps from banks such as Société Générale, BNP Paribas, RBS, NatWest, Halifax, HSBC, TSB and Santander. All data gathered is sent back to a Command and Control (C&C) server where it is harvested and shared.

January 09, 2017

Due to the constantly evolving nature of the malware, Zscaler researchers have previously dubbed Marcher "the most prevalent threat to the Android devices" and the malware attacks all versions of Google's mobile operating system.

January 06, 2017

“Android Marcher has been around since 2013 and continues to actively target mobile user’s financial information," says Zscaler’s Viral Gandhi. "To avoid being a victim of such malware, it is always a good practice to download apps from trusted app stores such as Google Play. This can be enforced by unchecking the ‘Unknown Sources’ option under the ‘Security’ settings of your device.”

January 06, 2017

“While it may be the CIO’s responsibility to enact the requirements needed to achieve a secure environment, the CSO is ultimately responsible for enabling security," Harmer said. "CSOs must understand the requirements laid out by the CIO and are responsible for providing the most effective, easily integrated and cost-effective security solutions. Separation of CIO and CSO responsibility is fundamental and should be implemented by default.”

January 06, 2017

“Recently, ThreatlabZ came across a variant of Android Marcher Trojan disguised as the Super Mario Run app in one of our threat feeds,” the firm explained. “This malware scams users by presenting fake finance apps and credit card page in order to harvest banking details.”

January 06, 2017

Marcher is a sophisticated banking malware strain that targets a wide variety of banking and financial apps and credit cards by presenting fake overlay pages. Once the user's mobile device has been infected, the malware waits for victims to open one of its targeted apps and then presents the fake overlay page asking for banking details. Unsuspecting victims will provide the details that will be harvested and sent out to to the malware's command and control (C&C) server.

January 06, 2017

“Once the user's mobile device has been infected, the malware waits for victims to open one of its targeted apps and then presents the fake overlay page asking for banking details. Unsuspecting victims will provide the details that will be harvested and sent out to the malware's command and control (C&C) server" Zscaler says.