One Article Review

Accueil - L'article:
Source NetworkWorld.webp Network World
Identifiant 339891
Date de publication 2017-03-17 06:09:00 (vue: 2017-03-17 06:09:00)
Titre Ask.com serves as a conduit for malware - again
Texte Businesses that allow the Ask.com toolbar in their environments might want to rethink that after endpoints equipped with the browser add-on were compromised last November and then again the very next month using pretty much the same attack methods.In both cases attackers managed to infiltrate the Ask.com updater infrastructure to the point that they used legitimate Ask signing certificates to authenticate malware that was masquerading as software updates.And in both cases Ask Partner Network (APN), which distributes the Ask.com toolbar, told the security vendors who discovered the incidents that it had fixed the problem. The first one was discovered by security vendor Red Canary, and the second was caught by Carbon Black, whose researchers just wrote about it in their company blog.To read this article in full or to leave a comment, please click here
Envoyé Oui
Condensat about add after again allow apn article ask attack attackers authenticate black blog both browser businesses canary carbon cases caught certificates click com comment company compromised conduit discovered distributes endpoints environments equipped first fixed full had here incidents infiltrate infrastructure just last leave legitimate malware managed masquerading methods might month much network next november one partner please point pretty problem read red researchers rethink same second security serves signing software then told toolbar updater updates used using vendor vendors very want which who whose wrote
Tags
Stories
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: