Remove Applications Remove Malware Remove Windows
article thumbnail

The latest trends in the threat landscape

CIO Business Intelligence

Each quarter HP’s security experts highlight notable malware campaigns, trends and techniques identified by HP Wolf Security. Living-off-the-land techniques Many malware campaigns relied on living-off-the-land (LOTL) techniques to help attackers remain undetected by blending in with legitimate system admin activity [7].

Trends 261
article thumbnail

IBM X-Force: Stealthy attacks on the rise, toolkits targeting AI emerge

Network World

Obfuscation is becoming an important tactic for threat actors, and PDF malware disguises malicious URLs by encrypting them, hiding them in compressed streams or using hexadecimal representations which can also hinder automated analysis of email security solutions, IBM wrote.Of

IBM 369
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Financial cybercrime group abuses Windows app compatibility feature

Network World

When Microsoft made it possible for enterprises to quickly resolve incompatibilities between their applications and new Windows versions, it didn't intend to help malware authors as well. Yet, this feature is now abused by cybercriminals for stealthy and persistent malware infections.

Windows 235
article thumbnail

New Windows code injection method could let malware bypass detection

Network World

Security researchers have discovered a new way that allows malware to inject malicious code into other processes without being detected by antivirus programs and other endpoint security systems. The new method was devised by researchers from security firm Ensilo who dubbed it AtomBombing because it relies on the Windows atom tables mechanism.

Malware 150
article thumbnail

How to scan your Windows PC for malware

The Verge

If you think your PC is infected with some kind of malware or you just want to do a scan as part of a digital cleanup, Windows has a built-in security tool that can help you on your way — no third-party software to install or pay for. It’s called Windows Security. Windows Security’s built-in virus and threat protection feature.

Malware 124
article thumbnail

Non-malware attacks are on the rise

Network World

Security pros need to pay attention to malicious activities that don’t rely on actual malware to succeed, according to a study by Carbon Black. Non-malware attacks are at the highest levels we have seen and should be a major focus for security defenders during the coming year,” it says. million-plus endpoints.

Malware 150
article thumbnail

Enterprise IT in 2014 – Under-the-Radar Challenges with WAN Bandwidth, BYOD, and XP Security

CTOvision

Careful testing and limited pilot deployments are perennial success strategies with WAN-trafficking applications. Bandwidth-optimizing technologies and applications can also be good investments. The end of support for Windows XP, slated for April 8, 2014, is a dangerous security issue. BYOD Will Fail to Live up to the Hype.

WAN 273