It’s been said that a picture is worth a thousand words. Unfortunately, there’s one that’s worth your bank accounts. We came across malware that uses steganography to hide configuration files within images. However unique this technique might seem, it is hardly new—we previously featured targeted attacks that use the same technique. The ZBOT malware, detected as…
Read MoreThe downside of popularity is that cybercriminals tend to abuse it for their own nefarious ends. Case in point, social networking sites have been often used to proliferate malware. Just recently, we spotted a Facebook clickjacking attack that leverages and abuses Instagram to point users to malicious websites. Users encounter this threat by being tagged…
Read MoreThe emergence of Twitter as a major microblogging tool with the feel of a social networking site also means it becomes a worthy cybercriminal target. Recent pranks, annoying at worst but not essentially harmful to accounts or systems, continue the series of attacks on the site. We blogged about Twitter threats before: So Is It…
Read MorePerhaps everyone concerned about online security has heard of clickjacking. This cyberbuzzword was disclosed in the last week of September and remains hot until now. Experts are quite forceful in harping about how scary this new form of cyberjacking is while a lot of us are perhaps still lost—if not confused or complacent—as to what…
Read More