BlackBerry Cylance Threat Researchers recently discovered obfuscated malicious code embedded within WAV audio files. Some of the WAV files contained code associated with the XMRig Monero CPU miner. Others included Metasploit code used to establish a reverse shell. This suggests a two-pronged campaign to deploy malware for financial gain and establish remote access within the victim network.
Citadel is a variation of the ZeuS banking Trojan. It uses a technique called man-in-the-browser to harvest sensitive information like banking credentials, passwords, and other sensitive user data.
A future in which all cars are autonomous is going to have huge impacts on the world as we know it today. There are significant challenges to be overcome in rolling out truly autonomous cars, but they are likely to bring just as many benefits to society.
When it comes to matters of technology, data, and information security, the law is frequently playing catch-up. Daniel J. Solove’s seminal text, 'Understanding Privacy', investigates the consequences, and why it should matter to all of us.