[From the desk of Paul Davis – his opinions and no-one else’s]
…
So onto the news:
Apple is cracking down on antivirus apps
Apple has begun a campaign to remove antivirus apps from its App Store, 9to5Mac reports.
One of the first casualties of Apple’s crackdown was VirusBarrier iOS. A blog post published by the app’s developer explained that “several companies” were affected by Apple’s decision.
There’s no official announcement from Apple about its change in policies — it just started banning apps. What it’s cracking down on are any apps that claim to scan iPhone for viruses, promising to fix any viruses that it finds. It seems that Apple doesn’t want iPhone owners to believe that there are viruses on their phone just because an App Store app claims to be able to scan it and get rid of them.
Link: http://paulgdavis.us3.list-manage1.com/track/click?u=45bf3caf699abf9904ddc00e3&id=9040f71ed1&e=20056c7556
Organisations still not prepared to address the ‘enemy within’
Speaking to IT Security Guru, Clearswift senior vice president of products Guy Bunker said that in a sense, “everything is getting worse” as from the perspective of the organisation, the coupling of technologies with the open network are responsible for two-third of the threats within the extended enterprise.
The survey found that only 14 per cent of respondents believe that until their organisation has a serious internal data breach, it will never be taken as seriously as the threat of external hackers, while 72 per cent of companies believe internal security threats are still not treated with the same level of importance as external threats by the board.
Link: http://paulgdavis.us3.list-manage.com/track/click?u=45bf3caf699abf9904ddc00e3&id=d555e644c3&e=20056c7556
LATEST DRIDEX CAMPAIGN EVADES DETECTION WITH AUTOCLOSE FUNCTION
Pushers of the Dridex banking malware have gone old-school for some time now, moving the malware through phishing messages executed by macros in Microsoft Office documents.
While macros are disabled by default since the release of Office 2007, the malware includes somewhat convincing social engineering that urges the user to enable macros—with directions included—in order to view an important invoice, bill or other sensitive document.
Pushers of the Dridex banking malware have gone old-school for some time now, moving the malware through phishing messages executed by macros in Microsoft Office documents.
The cat and mouse game between attackers and defenders took another turn recently when researchers at Proofpoint discovered that a recent spate of phishing messages contained macros-based attacks that did not execute until the malicious document was closed.
The technique, which involves the inclusion of an AutoClose method, which helps the malware sample evade detection.
Link: http://paulgdavis.us3.list-manage1.com/track/click?u=45bf3caf699abf9904ddc00e3&id=e8a75d5a10&e=20056c7556
NJRat Trojan Returns To Life, Warns PhishMe
A remote access trojan, last seen a year ago, is making a reappearance warns security researcher
Tokazowski said that he had examined recent messages and the malware within, and discovered that the executable element had been compiled with .NET 4.0.
The warning came from security specialist PhishMe, which found evidence that the malware is making a comeback.
Link: http://paulgdavis.us3.list-manage1.com/track/click?u=45bf3caf699abf9904ddc00e3&id=470c4c8974&e=20056c7556
============================================================
Feedback, questions? Our mailing address is: ** dailynews@paulgdavis.com (mailto:dailynews@paulgdavis.com)
If someone forwarded this email to you and you want to be added in,
please click this: ** Subscribe to this list (http://paulgdavis.us3.list-manage.com/subscribe?u=45bf3caf699abf9904ddc00e3&id=e09452545a)
** Unsubscribe from this list (http://paulgdavis.us3.list-manage2.com/unsubscribe?u=45bf3caf699abf9904ddc00e3&id=e09452545a&e=20056c7556&c=ef1fa8c6ab)
** Update subscription preferences (http://paulgdavis.us3.list-manage2.com/profile?u=45bf3caf699abf9904ddc00e3&id=e09452545a&e=20056c7556)