Unit 42 has recently identified malware exploiting an attack technique we have named “BackStab,” in which attackers can capture private information from backup files stored on a Windows PC or Macintosh. Under default conditions, iOS devices plugged into a computer running iTunes may create an unencrypted backup file that contains many types of private information. Forensics experts have known about these backups for years and have used them to capture phone data without requiring direct access to the phone. We have found that malicious attackers are now using malware to steal data using this same technique.

 


 

AV-Comparatives 

AV-Comparatives, the independent organization that tests and assesses antivirus (AV) software, announced the completion of its 2017 “Comparison of Next-Generation Security Products” and presented Traps advanced endpoint protection with its “Approved” award. The firm conducted a series of malware protection and exploit prevention tests on Traps during September and October 2017. Download the report to view the results of this test.
  • 3
  • 11947

WildFire Datasheet

WildFire Datasheet
  • 7
  • 27050

Threat Prevention Datasheet

Today’s attackers are well-funded and well-equipped. They use evasive tactics to succeed in gaining a foothold in the network, launching both high-volume and sophisticated attacks while remaining invisible to an organization’s traditional defenses – from packet obfuscation, polymorphic malware and encryption to multi-phased payloads and fast-flux DNS.
  • 1
  • 21969

Security Lifecycle Review

Security Lifecycle Review
  • 6
  • 6594

Actionable Security Intelligence

This white paper describes how Palo Alto Network next-generation firewalls and Panorama help you get actionable security insights.
  • 27
  • 14331

WildFire Appliance (WF-500)

The WildFire Appliance WF-500 automatically detects and prevents zero-day exploits and malware with on-premise analysis that meets privacy and regulatory requirements.
  • 2
  • 4332