Always Ahead of the Threat .. with CYREN Security Blog

8
© 2014 CYREN Confidential and Proprietary 1 Wednesday, June 22, 2022 © 2014 CYREN Confidential and Proprietary ALWAYS AHEAD OF THE THREAT... ...WITH CYREN BLOG

description

Stay ahead of trending internet threats with CYREN Security blog. Take a quick peek at what was trending in August 2014 and visit our blog for more detailed information: www.blog.CYREN.com

Transcript of Always Ahead of the Threat .. with CYREN Security Blog

Page 1: Always Ahead of the Threat .. with CYREN Security Blog

© 2014 CYREN Confidential and Proprietary 1April 10, 2023 © 2014 CYREN Confidential and Proprietary

ALWAYS AHEAD OF THE THREAT...

...WITH CYREN BLOG

Page 2: Always Ahead of the Threat .. with CYREN Security Blog

2© 2014 CYREN Confidential and Proprietary 2

AUGUST SAW THE RETURN OF WELL KNOWN THREATS USED FOR NEW PURPOSES

AND TRAGEDY BEING USED TO SPREAD MALWARE

Page 3: Always Ahead of the Threat .. with CYREN Security Blog

© 2014 CYREN Confidential and Proprietary 3

CREDIT CARD INFO STOLEN FROM POINT OF SALE MACHINES TARGETED BY “BACKOFF” MALWARE

“Although, this threat has been in the wild for some time, it has been recently reported that it is now being referred to as “Backoff”, and is being used to the infect Point-of-Sale (POS) machines of big retail stores in the United States. The intended purpose is to steal payment information, particularly credit card data.”

Page 4: Always Ahead of the Threat .. with CYREN Security Blog

© 2014 CYREN Confidential and Proprietary 4

419 USES EBOLA VIRUS TRAGEDY

“Cybercriminals will stoop to any level it seems, even using the tragedy of the Ebola virus in West Africa to steal money.”

Page 5: Always Ahead of the Threat .. with CYREN Security Blog

© 2014 CYREN Confidential and Proprietary 5

WHAT YOU SEE ISN’T NECESSARILY WHAT YOU GET

“Over the past few months, CYREN analysts have observed a rise in malware distributed via fake document icons. While nothing new (in fact, this is an old malware distribution trick), unsuspecting victims regularly still get taken in by this form of cybercrime which primarily targets the Adobe Acrobat PDF and Microsoft Word and Excel files.”

Page 6: Always Ahead of the Threat .. with CYREN Security Blog

© 2014 CYREN Confidential and Proprietary 6

WHAT YOU SEE ISN’T NECESSARILY WHAT YOU GET

“When you create a file on your computer, the software you are using embeds a code in the file that tells your computer’s operating system which software icon should appear on your computer screen.”

Page 7: Always Ahead of the Threat .. with CYREN Security Blog

© 2014 CYREN Confidential and Proprietary 7

PHONY ROBIN WILLIAMS PHONE VIDEO POSTS ON FACEBOOK

“The recent and tragic death of actor and comedian Robin Williams shocked the world. Most people strongly feel that the man should be allowed to rest in peace and his family allowed to grieve privately. Yet, a basic respect for life and death seems to be lacking in the mind of the vast majority of cybercriminals.”

Page 8: Always Ahead of the Threat .. with CYREN Security Blog

© 2014 CYREN Confidential and Proprietary 8

Visit the CYREN blog for more details and watch out for upcoming articles on latest

trends in malware, web security and more

www.blog.CYREN.COM