Wiper Malware Advisory
As per the cyber threat landscape, researchers have identified the latest strain of malware to have wiper capabilities and has so far affected many organizations globally. Wiper Malware refers to sophisticated malicious software that destroys data on the compromised hard disk with extremely low chances of recovery. A successful attack would therefore be VERY damaging to an organization’s information.
Trojan Skimer. 18 infects ATMs
Russian anti-virus company Doctor Web is warning users about the Trojan program Trojan.Skimer.18. The criminals behind this malware attack are targeting ATMs of the world's largest manufacturers. The trojan canintercept and transmit bank card information processesd by ATMs as well as data on the card and its PIN code. (Follow link)
(December 16, 2013)
EAC Regional Meeting Presentations and Outcome documents
NITA-U in partnership with the United Nations Office on Drugs and Crime (UNODC) and the Commonwealth Cybercrime Initiative (CCI) is held the EAC Regional Meeting on ‘Preventing and Combating Cybercrime’ on 27th and 28th May 2014 at Speke Resort Munyonyo.
Microsoft Excel CVE-2013-3890 Memory Corruption Vulnerability
Microsoft Excel is prone to a memory-corruption vulnerability. Attackers can exploit this issue to execute arbitrary code in the context of the currently logged-in user. Failed attacks will cause denial-of-service conditions.
Technologies Affected
Microsoft Excel 2007 SP3
Microsoft Excel Viewer
Microsoft Office Compatibility Pack SP3
Recommendations
Run all software as a nonprivileged user with minimal access rights.
Fraudulent Pyramid Schemes
The public attention is drawn to emerging fraudulent business models that depend on members recruiting new entrants in exchange for quick win payments. They are classified as fraudulent Pyramid Schemes since they rely on a continuous enrolment cycle of new members/ subscribers/ agents with the following characteristics: