Two new malware campaigns have been spotted in the Middle East, according to reports released this week, one targeting energy companies and the other going after political targets in Lebanon.
Brian Kenyon, Chief Technology Strategist, McAfee, a part of Intel Security, follows a “define-freeze-fix” approach to eradicate malware, and is confident that his company is well positioned to deal with today’s ever-evolving threat landscape.
Microsoft has taken legal action to combat the spread of malware that the company says can be traced to bad actors in Kuwait and Algeria.
Security researchers said they’ve spotted a new type of banking malware that rivals the capabilities of the infamous Zeus malware. The malware, which is being called “Dyreza” or “Dyre,” uses a man-in-the-middle attack […]
This growth was largely attributed to misuse of automated Content Distribution Networks (CDNs) that wrap malicious code within digitally signed installers. Vincent Weafer, Senior Vice President, McAfee Labs, said point-of-sale (POS) attacks and […]
2014 marks the 10th anniversary of Cabir, the world’s first mobile phone malware. To mark this occasion, Fortinet’s FortiGuard Labs is taking a stroll down memory lane to examine the evolution and significance of mobile threats during the last 10 years.
Microsoft confirmed on Friday that it will continue to offer its malware scrubbing program to Windows XP users for more than a year after it stops patching the operating system.
A deeper look by Cisco Systems into the cyberattack that infected Yahoo users with malware appears to show a link between the attack and a suspicious affiliate traffic-pushing scheme with roots in Ukraine.
Yahoo said that malware spread by advertisements served by its European websites had not affected users in North America, Asia Pacific and Latin America as people in these locations did not receive them.
Trustwave’s SpiderLabs researchers have found a piece of malware that collects data entered into Web-based forms, pretending to be a module for Microsoft’s Internet Information Services (IIS) web-hosting software.
New attack campaigns have infected point-of-sale (PoS) systems around the world with sophisticated malware designed to steal payment card and transaction data.
Analyst firm A-V Comparative has released its November 2013 list of the antimalware programmes that do the best job of removing malware from an already infected system.
Researchers have demonstrated that microphones and speakers built into laptops can be used to covertly transmit and receive data through inaudible audio signals.
Cybercriminals are increasingly using the “Blackshades” malware program whose source code was leaked three years ago, according to an analysis by Symantec.
Through the advent of mobility, smartphones and tablets are now more dangerous devices to enterprises than laptops and PCs.
Mobile malware continues to proliferate, and at the same time employees are insisting on bringing their personal devices to work.
Malicious software aimed at stealing online banking credentials surged in the third quarter of this year to a level not seen since 2002, according to a new report from Trend Micro.
The FBI has offered large rewards for information that could help them catch a clutch of alleged cyber-criminals.
Microsoft today said that attackers are exploiting a critical and unpatched vulnerability in Office 2007 using malformed documents to hijack Windows PCs, and that Office 2003 and Office 2010 are also vulnerable.
Kaspersky Lab has revealed research results that show an increase in malware in the Middle East.
A malicious software program found in ATMs in Mexico has been improved and translated into English, which suggests it may be used elsewhere, according to security vendor Symantec.
Kaspersky Lab researchers identified Android malware threats that receive commands from attackers through the Google Cloud Messaging service.
FireEye could soon be known on the stock market as FEYE if its plans to go public in a $175 million bid made official with the SEC today come to fruition.
Highly organised Russian groups have transformed mobile hacking into an industrial scale business, a kind of “malware-as-a-service,” complete with marketing affiliates, distributors and customer support.
Researchers at F-Secure have discovered malware targeting OS X, which leverages a technique called right-to-left override (RLO) in order to spoof its malicious nature.
The first tools for injecting legitimate Android apps with open-source software that allows an attacker to control an infected smartphone remotely have been found in the criminal underground.
A new version of a file-infecting malware program that’s being distributed through drive-by download attacks is also capable of stealing FTP (File Transfer Protocol) credentials.
The number of mobile malware apps has jumped 614 percent in the last year, according to studies conducted by McAfee and Juniper Networks.
A persistent, widespread malware campaign that utilises compromised Apache servers is locking users’ computers and demanding a fee of $300 to free their data.
Malware modifies localised versions of social networks, banks and e-commerce sites when accessed from infected computers.
The creation of Android malware is now mature enough for there to be development cycles that mimic those of the legitimate software world, a report from Juniper Networks has concluded.
While important, Google’s new policy of scanning apps for malware before making them available on the official Chrome Web Store falls short of providing maximum protection, one expert says.
The source code for the Carberp banking Trojan program is being offered for sale on the underground market at a very affordable price.
Hackers have found a devious new way to disseminate malware: They’re using peer-to-peer networks.
A new variant of the Citadel financial malware is targeting users of the Payza online payment platform by launching local in-browser attacks to steal their credentials, according to researchers from security firm Trusteer. […]
The amount of cyber-criminal activity associated with the Zeus family of financial Trojan programs has increased during the past few months, according to security researchers from anti-virus vendor Trend Micro. “The notorious info-stealing […]
Bit9 has teamed with FireEye and Palo Alto Networks, which each have sandboxing technologies, in order to share information related to zero-day attack code. FireEye and Palo Alto Networks, with its next-generation firewall, each have sandboxing […]
The computer virus seems to be making a subtle comeback. The term virus is frequently used as a catch-all for malicious software, but actually describes a very specific type of program that infects […]
Hackers are finding it pays to call ahead before sending malware-laden email. Symantec has seen what it describes as a sophisticated social engineering campaign aimed at French-speaking accounting and finance department employees. The […]
A cybercriminal has taken to selling his malware and related services on Facebook, boldly choosing a public forum to reach potential customers over the secretive world of the online underground. RSA researchers recently discovered on […]
Researchers following a cyber espionage campaign apparently bent on stealing drone-related technology secrets have found additional malware related to the targeted attacks. FireEye researchers have been tracking so-called “Operation Beebus” for months, but […]
Security researchers from Kaspersky Lab have identified a spam message campaign on Skype that spreads a piece of malware with Bitcoin mining capabilities. Bitcoin (BTC) is a decentralised digital currency that has seen […]
Researchers from security vendor FireEye have uncovered a new APT (advanced persistent threat) that uses multiple detection evasion techniques, including the monitoring of mouse clicks, to determine active human interaction with the infected […]
A new piece of malware that infects point-of-sale (POS) systems has already been used to compromise thousands of payment cards belonging to customers of U.S. banks, according to researchers from Group-IB, a security […]
A new piece of custom malware sold on the underground Internet market is being used to siphon payment card data from point-of-sale (POS) systems, according to security researchers from antivirus vendor McAfee. Dubbed […]
China and India were the top two “victim” countries in the Asia Pacific, according to a recent Web threat report. Conducted by Web and mobile security firm Websense, the 2013 Threat Report also […]
The Samsung Galaxy S6 is now the benchmark for high-end smartphones running Android, but there are lots of challengers, including the new P8 from Huawei Technologies. The two smartphone vendors have had many […]
Following on from its predecessor My Cloud, WD’s EX4 follow up provides a robust cloud-based storage option for the connected consumer.
With space for four hard disks, the 16TB NAS Pro 4-Bay storage unit is ideal for small businesses. However, Seagate has added a couple of neat features that make the device accessible to the average file hoarder.