Tag Archive for: Stealthy

Stealthy Mac malware spies on encrypted browser traffic

A new malware program that targets macOS users is capable of spying on encrypted browser traffic to steal sensitive information.

The new program, dubbed OSX/Dok by researchers from Check Point Software Technologies, was distributed via email phishing campaigns to users in Europe.

One of the rogue emails was crafted to look as if it was sent by a Swiss government agency warning recipients about apparent errors in their tax returns. The malware was attached to the email as a file called Dokument.zip.

What makes OSX/Dok interesting is that it was digitally signed with a valid Apple developer certificate. These certificates are issued by Apple to members of its developer program and are needed to publish applications in the official Mac App Store.

To read this article in full or to leave a comment, please click here

Network World Security

Google reveals its stealthy moves to keep Android phones free from malware – Greenbot

Google reveals its stealthy moves to keep Android phones free from malware
Greenbot
As software engineer Megan Ruthven explains, Google has developed a metric “to identify the security-related reasons that devices stop working and prevent it from happening in the future.” If a device has stopped using Verify Apps, Google dives into

and more »

android security – read more

Startup Niara aims to catch stealthy attacks

Startup Niara has come out of stealth to do battle in the growing field of security intelligence and analytics where it detects and correlates anomalous behaviors and assigns confidence scores that indicate whether they should be further investigated as threats.

Niara Security Intelligence is a software platform that gathers data from TAP or SPAN ports on routers, logs, SIEMs, IDSes and other third-party products customers may already own.

Its Niara Analyzer crunches the data and correlates events that could represent attacks, assigns severity scores and issues alerts that can be drilled into by security analysts to reveal the underlying forensic elements from which the analyzer concluded threats.

To read this article in full or to leave a comment, please click here

Network World Tim Greene