Articles for February 2018

What is malware? Everything you need to know about viruses, trojans and malicious software | ZDNet

This is everything… everything?  Really?  I’m sure I could shed some light on some parts that have been left out.

Cyber attacks and malware are one of the biggest threats on the internet. Learn about the different types of malware – and how to avoid falling victim to attacks.

Source: What is malware? Everything you need to know about viruses, trojans and malicious software | ZDNet

Phone-Cracking Firm Found a Way to Unlock Any iPhone Model

Remember the infamous encryption fight between Apple and the FBI for unlocking an iPhone belonging to a terrorist behind the San Bernardino mass shooting that took place two years ago?

After Apple refused to help the feds access data on the locked iPhone, the FBI eventually paid over a million dollar to a third-party company for unlocking the shooter’s iPhone 5c.

Now, it appears that the federal agency will not have to fight Apple over unlocking iPhones since the Israeli mobile forensics firm Cellebrite has reportedly figured out a way to unlock almost any iPhone in the market, including the latest iPhone X.

Source: Phone-Cracking Firm Found a Way to Unlock Any iPhone Model

Ransomware: Get ready for the next wave of destructive cyberattacks | ZDNet

It might not be flavour of the month right now, but cybercriminals and nation-states could still find plenty of uses for ransomware.

It might look to be out of the limelight compared to 2017, but it would be foolish to write ransomware off yet, as more attacks using the file-encrypting malware are ahead.

High profile incidents like WannaCryNotPetya and Bad Rabbit made ransomeware infamous last year. WannaCry and NotPetya have since both been attributed to be the work of nation-states – the former to North Korea and the latter to Russia – changing the perception of ransomware from something used by cybercriminals attempting to make a quick buck, to it becoming a tool of cyberwarfare.

Source: Ransomware: Get ready for the next wave of destructive cyberattacks | ZDNet

New Point-of-Sale Malware Steals Credit Card Data via DNS Queries

Cybercriminals are becoming more adept, innovative, and stealthy with each passing day. They are now adopting more clandestine techniques that come with limitless attack vectors and are harder to detect.

A new strain of malware has now been discovered that relies on a unique technique to steal payment card information from point-of-sale (PoS) systems.

Since the new POS malware relies upon User Datagram Protocol (UDP) DNS traffic for the exfiltration of credit card information, security researchers at Forcepoint Labs, who have uncovered the malware, dubbed it UDPoS.

Source: New Point-of-Sale Malware Steals Credit Card Data via DNS Queries