always ahead of the threat .. with cyren security blog in september
DESCRIPTION
Stay ahead of trending internet threats with CYREN Security blog. Take a quick peek at what was trending in September 2014 and visit our blog for more detailed information: www.blog.CYREN.comTRANSCRIPT
© 2014 CYREN Confidential and Proprietary 1April 11, 2023 © 2014 CYREN Confidential and Proprietary
ALWAYS AHEAD OF THE THREAT...
...WITH CYREN BLOG
2© 2014 CYREN Confidential and Proprietary 2
CYREN SECURITY BLOG NAMED AMONG 40 INFORMATION SECURITY BLOGS YOU SHOULD BE
READING
BY SECURITY INNOVATION EUROPE
3© 2014 CYREN Confidential and Proprietary 3
SEPTEMBER SAW ICLOUD GETTING COMPROMISED, SIMPLE YET DANGEROUS MALWARE WRITTEN BY
HOUDINI AND EXPLOITS OF WORDPRESS VULNERABILITIES
ALSO INTRODUCING CONCEPT OF LAYERED SECURITY
© 2014 CYREN Confidential and Proprietary 4
HACKER POSTS PHOTOS OF CELEBRITIES IN THEIR BIRTHDAY SUITS
“The personal iCloud accounts of at least 100 celebrities were compromised and personally “revealing” images stolen off them and posted online in September. The question most people are asking (CYREN included) is “How did this happen?” A targeted phishing attack is certainly a possibility, as evidenced by this phishing image, which appears to come from Apple and asks the victim to verify his/her email address.”
© 2014 CYREN Confidential and Proprietary 5
DUAL DETECTION ENGINES—USING LAYERED SECURITY TO BATTLE CYBERCRIME
“While a good single engine can provide up to 98% threat detection, the fact of the matter is, no engine is ever going to provide 100% security. We began to wonder how close to 100% security can you get and what it would take to get there.”
© 2014 CYREN Confidential and Proprietary 6
FINDING DUNIHI BY HOUDINI
“Dunihi is a RAT (Remote Access Tool) written in VBS (Visual Basic Script) that provides backdoor access to the infected system. We detect this as VBS/Dunihi. It may have arrived via infected USB drive, attachment in spammed email or malicious link / hack website. ”
© 2014 CYREN Confidential and Proprietary 7
HACKERS EXPLOITING WORDPRESS VULNERABILITIES
“Increasingly cybercriminals are looking for any avenue possible to conduct an attack, and vulnerabilities in WordPress offer that path or “threat vector” to hackers wishing to gain access to a computer or network in order to deliver malicious content.”
© 2014 CYREN Confidential and Proprietary 8
Visit the CYREN Security blog for more details and watch out for upcoming
articles on latest trends in malware, web security and more
www.blog.CYREN.com