article thumbnail

4 ways attackers target humans to gain network access

CSO Magazine

I remember the infamous email-based computer worm , the “ILOVEYOU virus,” that infected fellow IT friends back in 2000. We hope that our antivirus or endpoint protection software alerts us to problems. Those victims should have known better than to click on an email that said ILOVEYOU, but they did and had to clean up afterwards.

article thumbnail

Cybereason and Doosan Corp Partner to Secure APAC Enterprises

Security Boulevard

Cybereason is excited to announce a partnership with South Korean multinational conglomerate and Global Fortune 2000 leader the Doosan Corporation (Doosan Digital Innovation, or DDI) to protect enterprises from sophisticated cyberattacks on endpoints and across their networks. .

Antivirus 119
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY – Notable events in hacking history that helped transform cybersecurity assessment

The Last Watchdog

The ILOVEYOU Worm (2000). It’s clear that when technology develops, people find creative ways to cause mass disruption, increasing the need for antivirus protection and firewalls. While no data was destroyed or compromised, emails experienced severe delays, and military and university operations halted.

article thumbnail

Chinese actors behind attacks on industrial enterprises and public institutions

Security Affairs

The CVE-2017-11882 flaw is a memory-corruption issue that affects all versions of Microsoft Office released between 2000 and 2017. The emails used weaponized Microsoft Word documents exploiting the CVE-2017-11882 vulnerability. The vulnerability affects the MS Office component EQNEDT32.EXE

article thumbnail

Behind the scenes with the head of Kaspersky’s GReAT

SecureList

Costin Raiu has been with Kaspersky since 2000, initially as the Chief Security Expert overseeing research efforts in the EEMEA region. That’s how I wrote my first antivirus, and from that moment on, more and more people asked if I could write them a custom solution for their problems. What makes research successful?

article thumbnail

Sandboxing: Advanced Malware Analysis in 2021

eSecurity Planet

Antivirus protection isn’t enough to protect against today’s advanced threats. Malware isn’t going away and even advanced monitoring and antivirus software can’t always catch what a malicious program will do when executed. Antivirus software is notable for its ability to scan programs being transferred, downloaded, and stored.

Malware 57
article thumbnail

Tracing the Supply Chain Attack on Android

Krebs on Security

In July 2017, Russian antivirus vendor Dr.Web published research showing that Triada had been installed by default on at least four low-cost Android models. com 2000-08-24 ALIBABA CLOUD COMPUTING (BEIJING) CO., For the remainder of this post, we’ll focus on the bolded domain names below: Domain Name Create Date Registrar.

Mobile 247