FireEye recently discovered a massive spear-phishing malware campaign targeting journalists in Hong Kong. The attack appeared to be state-sponsored, and hid a command and control server in their victim’s Dropbox account. As is often the case, the attack could have been circumvented by installing a few simple patches.
How can vendors support the patching process and improve Internet security?
Listen to our latest Security Slice podcast and hear Craig Young and Tyler Reguly discuss why using a computer without patching is like driving a car without changing the oil, why it’s difficult to detect malware that hides in cloud services, and an innovative application of whitelisting that could prevent similar attacks in the future.
CLICK HERE TO LISTEN TO THE PODCAST