RCI’s Wojtek Gwiazda spoke to Seth Hardy about recent Citizen Lab research on targeted attacks against human rights organizations and others, including the Dalai Lama.
Tag Archives: Malware
Source: Paul F. Roberts, IT World
Apple Computer took a bold step recently in its battle against malicious software that runs on its Mac operating system.
Source: Nart Villeneuve, Trend Micro
The term “Watering Hole” has become a popular way to describe targeted malware attacks in which the attackers compromise a legitimate website and insert a “drive-by” exploit in order to compromise the website’s visitors.
Source: Electronic Frontier Foundation
If the location of a particular computer cannot be determined, the Dutch police would be able to break in without ever contacting foreign authorities.
Source: Tom Brewster, Tech Week Europe
A prominent activist from the UAE has been targeted by surveillance malware likely to have been created by an Italian company, with a French exploit seller implicated too, according to researchers.
This week, at ISS World Americas, an annual surveillance trade show in Washington, law enforcement agents from around the world will gather to learn about the latest in computer spyware.
Source: Vernon Silver, Bloomberg
On a Monday in July, Ahmed Mansoor sat in his study in Dubai and made the mistake of clicking on a Microsoft Word attachment that arrived in an e-mail, labeled “very important” in Arabic, from a sender he thought he recognized.
Senior Security Analyst Seth Hardy gave a presentation during this year’s SecTor Conference in Toronto, Canada, which took place from 1-3 October, 2012.
Source: AP via The Washington Post
Microsoft says it has settled a computer-fraud case against a website operated by a Chinese businessman that had become a major hub for illicit Internet activity.
Source: Dan Goodin, ars technica
Millions of Internet users in Brazil have fallen victim to a sustained attack that exploited vulnerabilities in DSL modems, forcing people visiting sites such as Google or Facebook to reach imposter sites that installed malicious software and stole online banking credentials.