Trustwave's SpiderLabs researchers have found a piece of malware that collects data entered into Web-based forms, pretending to be a module for Microsoft's Internet Information Services (IIS) web-hosting software. The malware, which is ...
Tags: malware, IIS, Trustwave, Network security, Microsoft
A variety of network-controlled home automation devices lack basic security controls, making it possible for attackers to access their sensitive functions, often from the Internet, according to researchers from security firm Trustwave. ...
Tags: Computer Products, softwre
The average organisation believes it would spot a data breach in 10 hours, a McAfee global survey of IT professionals has found. But is that result good, indifferent or an indication of the downright complacent? The firm’s ...
Tags: Data Breaches, McAfee
Mozilla is taking steps to limit the risk of powerful subordinate Certificate Authority (CA) certificates falling into the hands of attackers and potentially being used to issue rogue certificates for use in SSL snooping attacks. The ...
Tags: Mozilla, browser maker, browser
Outsourcing has been identified as a key attack vector in almost two-thirds of security investigations carried out by security services company Trustwave. The claim was carried in the company's 2013 Global Security Report, which draws ...
IDG News Service - Turktrust, the Turkish certificate authority (CA) responsible for issuing an intermediate CA certificate that was later used to generate an unauthorized certificate for google.com, claims that the bad Google certificate ...
Tags: Google certificate, Google, Microsoft, Internet
Microsoft is hardening security certificates as part of this month's Patch Tuesday update, which includes nine fixes. In the Microsoft TechNet security blog, Yunsun Wee, director of Microsoft Trustworthy Computing wrote: "Today we are ...
Tags: Microsoft, security certificates, IE patch, document handling
IDG News Service - One of the world's most active spam botnets -- Grum -- was crippled after two of its command and control (CnC) servers hosted in the Netherlands were taken down, according to researchers from security firm FireEye. ...
Tags: spam botnets, Netherlands, FireEye, security
Microsoft has fixed 26 security holes in its software products – including five deemed "critical" – it said in its monthly security bulletin. The critical vulnerabilities affected Microsoft's Windows operating system, Internet ...
Tags: Microsoft, security holes, software products, critical vulnerabilities
Incident response investigations are increasingly showing businesses cannot rely on antivirus systems alone for protection, say security researchers. The gap is widening between the common malware threats most antivirus systems will ...
Tags: antivirus systems, security researchers, Ziv Mador, banking malware
When malware infects a machine it usually goes after the system software. But in a rare case worked on by SpiderLabs, researchers found a Trojan that had been infected by a virus, leaving both still functioning as normal. The two pieces ...
Tags: malware, system software, SpiderLabs, Trojan, virus
Malware is able to infect other malware and in some cases make it easier for anti-virus software to detect,an incident response investigation by data-security firm Trustwave Spiderslabs has discovered. The research looked at two pieces of ...
Tags: malware, data security, Trustwave Spiderslabs, Trojan, virus