Confronting malware intelligently

Anoosha Pervaz by Anoosha Pervaz - August 26th, 2014

Brian Kenyon, Chief Technology Strategist, McAfee, a part of Intel Security, follows a “define-freeze-fix” approach to eradicate malware, and is confident that his company is well positioned to deal with today’s ever-evolving threat landscape.

Microsoft: Kuwait & Algeria malware culprits

Zach Miners by Zach Miners - July 1st, 2014

Microsoft has taken legal action to combat the spread of malware that the company says can be traced to bad actors in Kuwait and Algeria.

Powerful banking malware Dyreza emerges

Jeevan Thankappan by Jeevan Thankappan - June 17th, 2014

Security researchers said they’ve spotted a new type of banking malware that rivals the capabilities of the infamous Zeus malware. The malware, which is being called “Dyreza” or “Dyre,” uses a man-in-the-middle attack […]

McAfee tracks three times as much malware in 2013

IDG Reporter by IDG Reporter - March 11th, 2014

This growth was largely attributed to misuse of automated Content Distribution Networks (CDNs) that wrap malicious code within digitally signed installers. Vincent Weafer, Senior Vice President, McAfee Labs, said point-of-sale (POS) attacks and […]

History lesson: Mobile malware

Axelle Apvrille, Senior Mobile Malware Analyst Researcher, Fortinet by Axelle Apvrille, Senior Mobile Malware Analyst Researcher, Fortinet - February 2nd, 2014

2014 marks the 10th anniversary of Cabir, the world’s first mobile phone malware. To mark this occasion, Fortinet’s FortiGuard Labs is taking a stroll down memory lane to examine the evolution and significance of mobile threats during the last 10 years.

Microsoft will furnish malware assassin to XP users until mid-2015

Gregg Keizer by Gregg Keizer - January 20th, 2014

Microsoft confirmed on Friday that it will continue to offer its malware scrubbing program to Windows XP users for more than a year after it stops patching the operating system.

Yahoo malvertising attack linked to larger malware scheme

Jeremy Kirk by Jeremy Kirk - January 13th, 2014

A deeper look by Cisco Systems into the cyberattack that infected Yahoo users with malware appears to show a link between the attack and a suspicious affiliate traffic-pushing scheme with roots in Ukraine.

Malware from Yahoo ads did not affect US and Mac and mobile users

John Ribeiro by John Ribeiro - January 7th, 2014

Yahoo said that malware spread by advertisements served by its European websites had not affected users in North America, Asia Pacific and Latin America as people in these locations did not receive them.

Data-stealing malware pretends to be Microsoft IIS server module

Jeremy Kirk by Jeremy Kirk - December 10th, 2013

Trustwave’s SpiderLabs researchers have found a piece of malware that collects data entered into Web-based forms, pretending to be a module for Microsoft’s Internet Information Services (IIS) web-hosting software.

Arbor Networks: point-of-sale malware infections on the rise

Lucian Constantin by Lucian Constantin - December 9th, 2013

New attack campaigns have infected point-of-sale (PoS) systems around the world with sophisticated malware designed to steal payment card and transaction data.

Kaspersky, six others top malware removal tests

Mark Hachman by Mark Hachman - December 5th, 2013

Analyst firm A-V Comparative has released its November 2013 list of the antimalware programmes that do the best job of removing malware from an already infected system.

Experimental malware uses inaudible sound to defeat network air gaps

Lucian Constantin by Lucian Constantin - December 4th, 2013

Researchers have demonstrated that microphones and speakers built into laptops can be used to covertly transmit and receive data through inaudible audio signals.

Symantec: ‘Blackshades’ malware still at large

Jeremy Kirk by Jeremy Kirk - November 26th, 2013

Cybercriminals are increasingly using the “Blackshades” malware program whose source code was leaked three years ago, according to an analysis by Symantec.

The worse for malware

Ben Rossi by Ben Rossi - November 19th, 2013

Through the advent of mobility, smartphones and tablets are now more dangerous devices to enterprises than laptops and PCs.
Mobile malware continues to proliferate, and at the same time employees are insisting on bringing their personal devices to work.

Banking malware infections rise to highest level since 2002

Jeremy Kirk by Jeremy Kirk - November 12th, 2013

Malicious software aimed at stealing online banking credentials surged in the third quarter of this year to a level not seen since 2002, according to a new report from Trend Micro.

FBI offers $50,000 reward for ‘Lover Spy’ malware writer

John E Dunn by John E Dunn - November 11th, 2013

The FBI has offered large rewards for information that could help them catch a clutch of alleged cyber-criminals.

Middle East vulnerable to Microsoft malware attacks

Gregg Keizer by Gregg Keizer - November 6th, 2013

Microsoft today said that attackers are exploiting a critical and unpatched vulnerability in Office 2007 using malformed documents to hijack Windows PCs, and that Office 2003 and Office 2010 are also vulnerable.

Kaspersky investigation shows malware is on the rise

James Dartnell by James Dartnell - November 5th, 2013

Kaspersky Lab has revealed research results that show an increase in malware in the Middle East.

ATM malware may spread from Mexico to English-speaking world

Jeremy Kirk by Jeremy Kirk - October 28th, 2013

A malicious software program found in ATMs in Mexico has been improved and translated into English, which suggests it may be used elsewhere, according to security vendor Symantec.

Cybercriminals use Google Cloud Messaging service to control malware on Android devices

Lucian Constantin by Lucian Constantin - August 15th, 2013

Kaspersky Lab researchers identified Android malware threats that receive commands from attackers through the Google Cloud Messaging service.

Malware fighter FireEye files for $175M IPO

Bob Brown by Bob Brown - August 6th, 2013

FireEye could soon be known on the stock market as FEYE if its plans to go public in a $175 million bid made official with the SEC today come to fruition.

Malware-as-a-service blossoms in Russia, vendor research finds

John Cox by John Cox - August 6th, 2013

Highly organised Russian groups have transformed mobile hacking into an industrial scale business, a kind of “malware-as-a-service,” complete with marketing affiliates, distributors and customer support.

Signed Macintosh malware uses right-to-left override

Steve Ragan by Steve Ragan - July 17th, 2013

Researchers at F-Secure have discovered malware targeting OS X, which leverages a technique called right-to-left override (RLO) in order to spoof its malicious nature.

New Android malware lowers the bar for cyber-criminals

Antone Gonsalves by Antone Gonsalves - July 17th, 2013

The first tools for injecting legitimate Android apps with open-source software that allows an attacker to control an infected smartphone remotely have been found in the criminal underground.

Unusual file-infecting malware steals FTP credentials, researchers say

Lucian Constantin by Lucian Constantin - July 16th, 2013

A new version of a file-infecting malware program that’s being distributed through drive-by download attacks is also capable of stealing FTP (File Transfer Protocol) credentials.

Mobile malware, mainly aimed at Android devices, jumps 614% in a year

Lucas Mearian by Lucas Mearian - July 15th, 2013

The number of mobile malware apps has jumped 614 percent in the last year, according to studies conducted by McAfee and Juniper Networks.

‘Darkleech’ malware undertakes ransomware campaign

Jeremy Kirk by Jeremy Kirk - July 7th, 2013

A persistent, widespread malware campaign that utilises compromised Apache servers is locking users’ computers and demanding a fee of $300 to free their data.

Citadel malware variant uses content localisation to target brands and users in different countries

Lucian Constantin by Lucian Constantin - June 30th, 2013

Malware modifies localised versions of social networks, banks and e-commerce sites when accessed from infected computers.

Android malware devlopment now mimics commercial software, claims Juniper

John E. Dunn by John E. Dunn - June 30th, 2013

The creation of Android malware is now mature enough for there to be development cycles that mimic those of the legitimate software world, a report from Juniper Networks has concluded.

Despite new malware scanning, Chrome Web Store security still falls short

Antone Gonsalves by Antone Gonsalves - June 26th, 2013

While important, Google’s new policy of scanning apps for malware before making them available on the official Chrome Web Store falls short of providing maximum protection, one expert says.

Source code for Carberp financial malware is up for sale at a very low price, researchers say

Lucian Constantin by Lucian Constantin - June 19th, 2013

The source code for the Carberp banking Trojan program is being offered for sale on the underground market at a very affordable price.

More malware is travelling on P2P networks these days

Lucian Constantin by Lucian Constantin - June 18th, 2013

Hackers have found a devious new way to disseminate malware: They’re using peer-to-peer networks.

New Citadel malware variant targets Payza online payment platform

Lucian Constantin by Lucian Constantin - May 27th, 2013

A new variant of the Citadel financial malware is targeting users of the Payza online payment platform by launching local in-browser attacks to steal their credentials, according to researchers from security firm Trusteer. […]

Researchers warn of increased Zeus malware activity this year

Lucian Constantin by Lucian Constantin - May 27th, 2013

The amount of cyber-criminal activity associated with the Zeus family of financial Trojan programs has increased during the past few months, according to security researchers from anti-virus vendor Trend Micro. “The notorious info-stealing […]

Bit9, FireEye, Palo Alto Networks team to hit zero-day malware

Ellen Messmer by Ellen Messmer - May 22nd, 2013

Bit9 has teamed with FireEye and Palo Alto Networks, which each have sandboxing technologies, in order to share information related to zero-day attack code. FireEye and Palo Alto Networks, with its next-generation firewall, each have sandboxing […]

In a sea of malware, viruses make a small comeback

Jeremy Kirk by Jeremy Kirk - May 20th, 2013

The computer virus seems to be making a subtle comeback. The term virus is frequently used as a catch-all for malicious software, but actually describes a very specific type of program that infects […]

It’s better to call ahead before sending malware, Symantec finds

Jeremy Kirk by Jeremy Kirk - May 14th, 2013

Hackers are finding it pays to call ahead before sending malware-laden email. Symantec has seen what it describes as a sophisticated social engineering campaign aimed at French-speaking accounting and finance department employees. The […]

Facebook used as billboard for malware

Antone Gonsalves by Antone Gonsalves - April 28th, 2013

A cybercriminal has taken to selling his malware and related services on Facebook, boldly choosing a public forum to reach potential customers over the secretive world of the online underground. RSA researchers recently discovered on […]

More malware discovered from drone cyber attacks

Antone Gonsalves by Antone Gonsalves - April 25th, 2013

Researchers following a cyber espionage campaign apparently bent on stealing drone-related technology secrets have found additional malware related to the targeted attacks. FireEye researchers have been tracking so-called “Operation Beebus” for months, but […]

Kaspersky catches bitcoin-mining malware on Skype

IDG Reporter by IDG Reporter - April 8th, 2013

Security researchers from Kaspersky Lab have identified a spam message campaign on Skype that spreads a piece of malware with Bitcoin mining capabilities. Bitcoin (BTC) is a decentralised digital currency that has seen […]

New APT malware targets Middle Eastern governments

IDG Reporter by IDG Reporter - April 3rd, 2013

Researchers from security vendor FireEye have uncovered a new APT (advanced persistent threat) that uses multiple detection evasion techniques, including the monitoring of mouse clicks, to determine active human interaction with the infected […]

Researchers find another piece of POS malware

IDG Reporter by IDG Reporter - March 31st, 2013

A new piece of malware that infects point-of-sale (POS) systems has already been used to compromise thousands of payment cards belonging to customers of U.S. banks, according to researchers from Group-IB, a security […]

vSkimmer malware targets point-of-sale systems

IDG Reporter by IDG Reporter - March 25th, 2013

A new piece of custom malware sold on the underground Internet market is being used to siphon payment card data from point-of-sale (POS) systems, according to security researchers from antivirus vendor McAfee. Dubbed […]

China, India top malware ‘victims’ in Asia Pacific

IDG Reporter by IDG Reporter - March 5th, 2013

China and India were the top two “victim” countries in the Asia Pacific, according to a recent Web threat report.  Conducted by Web and mobile security firm Websense, the 2013 Threat Report also […]

Bitdefender: Government targeting MiniDuke malware is 21 months old

Joe Lipscombe by Joe Lipscombe - March 5th, 2013

A version of MiniDuke, the cyberspy malware aimed at governments and agencies in Europe and elsewhere, has been operating for at least 21 months, internet security firm Bitdefender has discovered. The newly discovered […]

  • Hands on with iPad Air 2 and iPad mini 3

    What’s rectangular, gold, and 18 percent thinner than a No. 2 pencil? The iPad Air 2, which Apple unveiled Thursday. Sporting subtle refinements like a Touch ID fingerprint sensor and a beefed-up iSight […]

  • Preview: Windows Server 10

    No major changes compared to Windows Server 2012 R2, but some very good incremental ones. With this just a very early version, here are some changes you might want to consider as you decide when to start looking at the release.

  • Review: Porsche Design Blackberry P’9883

    Although over-priced, the smartphone packs impressive features to meet the demands of the luxury user.

Copyright 2014 Computer News Middle East. All rights reserved. Product of CPI Media Group. For more information e-mail us at webmaster@cpimediagroup.com. Privacy Policy
SUBSCRIBE TO OUR NEWSLETTER * E-mail * First name: * Last name:
* Job title: * Industry sector: * Country:
x