Sat.Jan 26, 2019

article thumbnail

Using steganography to obfuscate PDF exploits

Security Affairs

Experts discovered PDF exploit that was using steganography to hide malicious JavaScript code in images embedded in PDF files. The exploit analysis firm EdgeSpot recently discovered PDF exploit that was using steganography to hide malicious JavaScript code in images embedded in PDF files. “Shortly after last week’s discovery of a PDF exploit which used the method of this.getPageNumWords() & this.getPageNthWord() for obfuscation, we found another, but much more powerful exploit ob

IT 103
article thumbnail

A Six Flags Fingerprints Ruling, Supply Chain Hacks, and More Security News This Week

WIRED Threat Level

Google's elite security team, police scanner encryption, and more of the week's top security news.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Upcoming Ukraine elections in the crosshairs of hackers

Security Affairs

The Ukrainian authorities are observing a surge in allege state-sponsored attacks aimed at disrupting the upcoming presidential election. Ukraine reported a surge in cyber attacks aimed at disrupting the upcoming presidential election, the Government believes that Russian nation-state actors could be responsible for them. The news was reported by Reuters, attackers intensified attacks against the Ukrainian government and political party, according to the experts with the clear intent of disrupti

article thumbnail

The Business of Data Newsletter – Issue 10

Information Matters

Which Countries Are Leading the Data Economy? – Harvard Business Review. 24 January 2019 “Which countries are the top data producers? After all, with data-fueled applications of artificial intelligence projected, by McKinsey, to generate $13 trillion in new global economic activity by 2030, this could determine the next world order, much like the role that oil production has played in creating economic power players in the preceding century.” [link].

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Local privilege escalation bug fixed in CheckPoint ZoneAlarm

Security Affairs

Check Point released a security update to address a flaw in its ZoneAlarm security software that could allow privilege escalation. Check Point released a security update to fix a vulnerability in its antivirus and firewall ZoneAlarm, the flaw could be exploited by attackers to escalate privileges on a system running it. The flaw was discovered last year by security firm Illumant , it was caused by the use of Microsoft’s Windows Communication Foundation (WCF) framework in the implementation of th

article thumbnail

Anatova ransomware – Expert believe it will be a dangerous threat

Security Affairs

Security experts at McAfee have discovered a new malware, dubbed Anatova ransomware, that has been spotted infecting computers worldwide. The name Anatova is based on a name in the ransom note that is dropped on the infected systems. The Anatova ransomware outstands for its obfuscation capabilities and ability to infect network shares, it has a modular structure that allows add ing new functions to the malware. “During our continuous hunt for new threats, we discovered a new ransomware fam