Remove 2010 Remove Antivirus Remove Internet
article thumbnail

RSAC Fireside Chat: Operationalizing diverse security to assure customers, partners–and insurers

The Last Watchdog

When I first interviewed him in 2010, “endpoint protection” was still called antivirus. Acohido is dedicated to fostering public awareness about how to make the Internet as private and secure as it ought to be. (LW They’re overlapping — and reshaping how security programs are evaluated. I’ll keep watching — and keep reporting.

Insurance 147
article thumbnail

Ask Fitis, the Bear: Real Crooks Sign Their Malware

Krebs on Security

Megatraffer explained that malware purveyors need a certificate because many antivirus products will be far more interested in unsigned software, and because signed files downloaded from the Internet don’t tend to get blocked by security features built into modern web browsers. “Why do I need a certificate?

Malware 314
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

On Chinese "Spy Trains"

Schneier on Security

It's also why the United States has blocked the cybersecurity company Kaspersky from selling its Russian-made antivirus products to US government agencies. We have credible reports that the Chinese hacked Gmail around 2010, and there are ongoing concerns about both censorship and surveillance by the Chinese social-networking company TikTok.

article thumbnail

Former Russian Cybersecurity Chief Sentenced to 22 Years in Prison

Krebs on Security

Those included spreadsheets chock full of bank account details tied to some of the world’s most active cybercriminals, and to a vast network of shell corporations created by Vrublevsky and his co-workers to help launder the proceeds from their various online pharmacy, spam and fake antivirus operations.

article thumbnail

Tracing the Supply Chain Attack on Android

Krebs on Security

A historic records search at Domaintools on that tosaka1027@gmail.com address says it was used to register 24 Internet domain names , including at least seven that have been conclusively tied to the spread of powerful Android mobile malware. net 2010-11-22 ALIBABA CLOUD COMPUTING (BEIJING) CO., com and rurimeter[.]com 2333youxi[.]com

Mobile 278
article thumbnail

Breach Exposes Users of Microleaves Proxy Service

Krebs on Security

Launched in 2013, Microleaves is a service that allows customers to route their Internet traffic through PCs in virtually any country or city around the globe. Microleaves works by changing each customer’s Internet Protocol (IP) address every five to ten minutes. Which hints at a possible BOTNET. “Online[.]io

article thumbnail

Tracing the Supply Chain Attack on Android

Krebs on Security

A historic records search at Domaintools on that tosaka1027@gmail.com address says it was used to register 24 Internet domain names , including at least seven that have been conclusively tied to the spread of powerful Android mobile malware. net 2010-11-22 ALIBABA CLOUD COMPUTING (BEIJING) CO., com and rurimeter[.]com 2333youxi[.]com

Mobile 189