News Categories
(34)Malware (39)Malicious emails (11)Web 2.0 (24)Facebook (22)Social Networks (44)Spam (2)Defensio (1)Comment Spam (15)Phishing (9)Web spam (4)Click-jacking (38)Compromise (20)Analysis (38)Exploits (14)Research (3)Presentations (3)Conferences (4)security conference (9)Mass Injection (10)Rogue AV (4)Blackhat SEO (2)Neosploit (23)Targeted attacks (7)Video (14)Zeus (5)Microsoft (4)Monthly Reports (1)twitter (3)Google (18)Vulnerabilities (9)Adobe (12)Java (4)Mobile (4)Apple (1)hacked (1)TAB (1)Black Hat USA 2011 (1)Google+ (20)0-day (1)CVE-2010-2884 (1)CVE-2011-1255 (1)Worm (14)Blackhole exploit kit (1)Incognit Exploit kit (2)Tuesday Patch (6)APT (6)Typosquatting (3)Vulnerability Analysis (1)CVE-2011-3402 (4)Web Research (4)Predictions (3)Adult (5)News (3)Black Hat SEO (6)Data loss (8)Scam (1)QR codes (6)Twitter (1)CVE-2012-0003 (1)CVE-2011-3389 (1)CVE-2012-0004 (1)Phoenix Exploit Kit (1)CrimePack (3)Reverse Engineering (2)Captcha (1)Valentine's day (2)Kelihos (1)SC Magazine Award Winner (1)Wordpress (1)MS12-010 (1)CVE-2012-0002 (1)Infosec (2)CVE-2012-0507 (8)Toolkits (1)Skywiper (2)Flame (1)Flamer (2)Passwords (1)freedom of expression (1)censorship (2)Plugins (3)Malvertising (14)Exploit (1)CVE-2012-1723 (1)CSI (2)ThreatSeeker (2)Adventures in Spam (1)CVE-2012-4681 (1)LBS (2)RAT (1)module Apache/2 (1)Cyber Monday (1)Black Friday (1)Pastebin (4)CVE-2012-4792 (1)iPad (1)super bowl (1)iPhone (2)iOS (4)Spear Phishing (1)Threat Report (3)ThreatScope (1)Dynamic DNS (1)China (1)SSL (1)APT1 (2)DLP (3)Hack (1)CVE-2012-4969 (2)threat lifecycle (1)ThreatSeeker Network (1)ACE (10)exploit kit (1)blackhole (2)Black Hole (1)DNS poisoning (1)RedKit Exploit Kit (4)exploit kits (1)threat stages (1)Certificates (1)Topical (1)Waterhole (1)CVE-2013-2463 (1)Neutrino exploit kit (1)CVE-2013-2473 (1)CVE-2013-3893 (2)Collective Threat Intelligence (1)CVE-2013-3963 (1)Targeted Attack (3)Advanced Malware (1)CVE-2013-3897 (1)Tor (5)cyber-crime (1)Mevade (2)Ransomware (3)Social Engineering (1)CookieBomb (2)LinkedIn (1)CVE-2013-3906 (2)Pony (3)Cryptolocker (2)Upatre (1)application telemetry (1)meta-data (3)dr. watson (1)windows error reporting (1)big data (2)data theft prevention (1)DTP (1)telemetry (2)CVE-2014-0322 (2)MSIE 0-day (1)Deputy Dog (1)Ephemeral Hydra (1)CVE-2013-0074 (1)CVE-2013-3896 (1)Silverlight (2)crash reports (1)POS (1)anomaly detection (1)goon (4)angler (1)ru:8080 (1)magnitude (3)flash (1)CVE-2013-2465 (1)malicious iframes (1)FIESTA (1)Exploits Kit (1)iframe (3)CVE-2014-0160 (2)OpenSSL (3)Heartbleed (3)Citadel (2)CVE-2014-1776 (1)VGX.DLL (1)necrus (1)cutwail (2)gameover (3)vulnerability (3)zbot (1)control panel (1)carberp (1)zberp (1)Caphaw (2)Nuclear exploit kit (1)Shylock (1)Dragonfly (1)Zeus PIF (1)bitly (1)fraud (2)RIG Exploit Kit (1)POS malware (1)Point Of Sale Malware (1)Ukraine (1)Russia (1)Shellshock (1)CVE-2014-6271 (1)poodle (1)cve-2014-3566 (1)sslv3 (1)Ebola (1)CVE-2014-4114 (1)CPA (1)Regin (1)CVE-2015-0311 (1)CVE-2015-0235 (1)linux (1)GHOST (1)CVE-2015-0072 (1)Internet Explorer (1)XSS (1)IE (1)TorrentLocker (1)Product Information (1)Money Laundering (1)APSA10-05 (1)Skype spam
RSS Feed
News
Nov
24
DeepSec 2011
Posted by Hermes Li on 24 November 2011 07:13 AM

The DeepSec IDSC is an annual European two-day in-depth conference on computer, network, and application security. DeepSec IDSC 2011 was held on November 17th and 18th 2011 at the Imperial Riding School, Vienna.

 

 

Hermes Li, security researcher at Websense Security Labs™, was speaking on Friday November 18th, the second day of the conference. He talked about an online game trojan framework from China's underground market, the source code of which he has analyzed outside of his main research at Websense. The deep analysis included the trojan's underground market, module components, prediction solution etc.

 

The slides from Hermes Li's talk An online game trojan framework from the China underground market can be downloaded here.

 

 

Websense Security Labs will continue its focus on all threats, and keep innovating on defense technology.


Read more »



Nov
16
Websense at Pacsec 2011 and AVAR 2011
Posted by uwang on 16 November 2011 12:26 AM

Last week, some members from the Websense Security Labs™ had a busy week because they attended the Pacsec 2011 and AVAR 2011 conferences.

The Pacsec 2011 conference was held in Tokyo, and addresses the increasing importance of information security in Japan. Many well-known figures in the international security industry got together with leading Japanese researchers to share best practices and technology.

The AVAR 2011 conference was held in Hong Kong, and has a reputation in the Asia Pacific IT industry as being the leading industry conference on anti malware technologies and threats. This conference is not relevant only for virus researchers, but also for corporate IT professionals who have a business and technical need to secure their system, and for those who wish to have a safe and secure computing environment and be protected against Internet threats.

Ulysses Wang and Nick Guo from Websense delivered the presentation "A New Approach to Automated JavaScript De-obfuscation" at Pacsec 2011. They presented the latest research project in Labs (which was about Javascript De-obfuscation), and showed a demo of the de-obfuscate engine with high performance. Good coverage was shown at the conference. Other researchers from different parts of the world also gave excellent presentations.

 

 

 

Xue Yang and Elson Lai from Websense delivered the presentation "Dissection of exploit kits" at AVAR 2011. The team at Websense Security Labs have been tracking exploit kits threats for long time. In this presentation, they showed the analysis statistics of the top 10 exploit kits (based on the Lab research findings), and used some typical exploit kits as examples by highlighting their key features and differences. They also compared the exploit kits with current APT (Advanced Persistent Threat) attacks from several aspects. Furthermore, they dived deep into protection mechanisms that are often used by exploit kits in an attempt to evade detection. They concluded the presentation by giving predictions on what Websense sees as emerging trends in exploit kit development, and gave viable solutions to these developments.

 

      

 

Websense Security Labs™ will continue its focus on all threats, and keep innovating on defense technology. 


Read more »