InfoSight Provides Network Protection Against TDLv4 Rootkit Malware

What is this? A new "TDLv4" version of the TDSS rootkit, which was first discovered in 2008, has infected over 4.5 million machines world-wide as of April 2011. Infected machines are joined to a botnet which can be used for malicious purposes such as mounting network/endpoint attacks, allowing installation of more malware on the infected systems, distributing "spam" emails, and exfiltrating user data. The Dirty Details... TDLv4 uses a number of sophisticated components including rootkit [...]

By | July 18th, 2011
IT Infrastructure, Network Security & Solutions|Comments Off on InfoSight Provides Network Protection Against TDLv4 Rootkit Malware

Security Alert: W32/Zbot Malware (also known as Zeus)

InfoSight has detected a flood of phishing emails that are propagating through the Internet and targeting small community banks.  This spam campaign is delivering hundreds of thousands of messages that masquerade as a failed wire transfer, while delivering the password-stealing Zeus banking Trojan.  The hackers were very aware of who to target; they went after the individuals in the bank responsible for wire transfers. A snapshot of a sample email is provided below. The <From:> [...]

By | July 5th, 2011
Network Security & Solutions|Comments Off on Security Alert: W32/Zbot Malware (also known as Zeus)

Largest Data Breaches of All Time

As Sony deals with their most recent data breach of one million passwords, Flowing Data took a look at the the largest data loss incidents on record, according to DataLossDB.        

By | June 14th, 2011
IT Infrastructure|Comments Off on Largest Data Breaches of All Time

Do you know which threats your Anti-Virus won’t stop?

News headlines have been a constant reminder every day that data leakage and malware attacks are on the rise, and increasing at high speeds.  Many believe these malicious attacks are targeted towards large corporations with big bucks, but businesses of all size and functions are facing these risks every day.  Your basic anti-virus solution alone won’t stop these attacks; you need to take extra provisions when protecting your organization. To help you mitigate the risks, [...]

By | April 21st, 2011
Industry InSights, IT Infrastructure|Comments Off on Do you know which threats your Anti-Virus won’t stop?

In The News: New Banking Trojan

Twitter |  Facebook |  LinkedIn In The News: New Banking Trojan The SonicWALL UTM Research team has received reports of a new banking Trojan named Tatanga in the wild. Spain, Germany, the United States, and the United Kingdom are the top countries affected by this Trojan. This Trojan has many sophisticated features resembling functions found in the popular crime-ware toolkits Zeus and SpyEye which includes: Encrypted configuration files Encrypted communication between the bot and the [...]

By | March 27th, 2011
IT Infrastructure|Comments Off on In The News: New Banking Trojan

Top Tech Threats & Trends for 2011

Twitter |  Facebook |  LinkedIn Top Tech Threats & Trends for 2011 Here at InfoSight, Inc. we have put together our take on what the key tech trends and threats of 2011 will be. We know as the technologies become faster and smarter so will the threats that follow them. The Social Engineering and Black Hat SEO we experienced in the previous year will still hold strong and continue to transform, and we’ll see a [...]

By | March 26th, 2011
IT Infrastructure|Comments Off on Top Tech Threats & Trends for 2011

What Are the Odds of a Security Breach at Your Institution?

If your home has ever been burglarized, you know the unnerving feeling of being violated and how the experience can haunt you for a long time. Obviously, locks and bolts are only as strong as the door and the frame they’re fitted to. This is also true of the security posture of financial institutions. Outdated software applications, misconfigured devices, and ineffective security policies are much like the weak or rotten woodwork framing the door of your home ...

By | March 31st, 2009
Network Security & Solutions|Comments Off on What Are the Odds of a Security Breach at Your Institution?

What Are the Top Security Threats for 2009?

Internet-based attacks are becoming increasingly sophisticated and specialized as profit-driven criminals continue to hone their approach to stealing data from businesses, employees and consumers. Security threats are propagating more rapidly, becoming increasingly difficult to detect, and are exploiting technological and human vulnerabilities. Learn about the top security threats for 2009.

By | March 26th, 2009
IT Infrastructure, Network Security & Solutions|Comments Off on What Are the Top Security Threats for 2009?

Don’t Let Development Pressures Cut Security Testing Short

There are more than 5,000 known security vulnerabilities and the number is growing. In 2008, there were 11.5% more internet security vulnerabilities disclosed than in 2007. That’s because we’re getting better at identifying and eliminating vulnerabilities. But all the progress made can be thrown out the window, if you’re in a hurry to roll out the latest and greatest software upgrade. Don’t cut security testing short just to meet deadlines...

By | March 26th, 2009
IT Infrastructure, Network Security & Solutions|Comments Off on Don’t Let Development Pressures Cut Security Testing Short