Malware News, Articles and Updates
Researchers have found the first known Android mobile malware to use a Twitter account, rather than a traditional command-and-control server, to control infected devices.
The threat from ransomware continues to grow and the situation will only get darker before mitigation efforts prove reliable and the miscreants move on to another attack vector, according to a panel of cybersecurity experts gathered in Manhattan on Wednesday for the Dell Data Security Ransomware Roundtable.
Five suspected cyberthieves have reportedly fled Thailand after allegedly stealing approximately $350,000 in cash from 21 malware-infected ATMs operated by the state-run Government Savings Bank (GSB).
Thirteen German financial institutions and their subsidiaries have recently felt the wrath of GozNym as the downloader and banking malware hybrid intensifies its campaign against European banking customers.
Although a ransomware attack hit the city of Sarasota, Fla. in February, owing to an ongoing criminal investigation, details of the attack are only now being revealed.
The meteoric rise of Locky ransomware has not completely supplanted the distribution of the notorious Dridex malware.
Ransomware is not going away, according to a new study from Arctic Wolf Networks.
An independent IT security research facility has reviewed Android, and despite constant charges of insecurity, found the mobile platform to be far from wanting ?
Updated! Retailer Eddie Bauer's CEO reported that the chain's in-store point-of-sale network had been infected with malware for a six-month period during which time payment card information may have been accessed by unauthorized personnel.
Brian Laing, VP of business development and products at APT defense firm Lastline, spoke to SCMagazine.com at Black Hat about the evolution of advanced persistent threats and some of their more devious tactics.
Researchers discovered DroidJack attacks that delivered the remote access Trojan (RAT) through an "over the top" (OTT) carrier.
Former board members and senior employees at SWIFT, said the company did not monitor or make attempts to improve the poor security practices of its clients.
For security-conscious Mac users, Christmas has come early this year, with reports of Google's Macintosh Operations Team developing a new whitelisting and blacklisting system for macOS.
Looking to capitalize on mobile device owners' growing security fears, a new variant of the Android malware Marcher is infecting victims by fraudulently posing as a firmware security update.
ESET researchers spotted the Nemucod downloader used to spread banking trojans and other malware operating in Brazil.
A cyber vigilante took internet justice into his own hands when he infected the computer of an tech support scammer with Locky ransomware.
WikiLeaks' practice of delivering unfiltered information to its readers backfired after a researcher discovered that its collection of leaked Turkish government emails contained over 300 active links to malware files hosted on the controversial site.
Independent researcher Michael Gillespie discovered a unique ransomware variant posing as a Pokémon Go application for Windows.
Capitalizing on Olympics activity, a new version of Zeus Sphinx has been targeting banks in Brazil and Colombia.
Researchers spotted a new information stealing trojan, dubbed Shakti, that may be of Indian origin and is designed for corporate espionage.
Researchers discovered a campaign that delivers a malicious banking Trojan to Android devices using Google AdSense advertisements.
In the latest data breach impacting the hospitality industry, cybercriminals installed malware in the point-of-sale systems of HEI Hotels & Resorts and checked out with customer data that likely includes payment card information.
A team of researchers developed a new method to leak information from air-gapped computers using intrinsic covert noises emitted from the device's hard drive.
Trend Micro researchers spotted a new variant of Locky ransomware using Windows Scripting Files (WSF) as a downloader.
If Zeus was the king of banking trojans, then newcomer Scylex is looking to claim Zeus' old perch atop the Mt. Olympus of financial malware.
Fresh off the discovery that hackers compromised the customer support portal for Oracle's MICROS point-of-sale systems, a new shocking report surfaced, revealing that at least five more POS vendors were similarly breached.
Software company Lavians Inc. is offering free utilities applications for download that actually contain the Bing.vc browser hijacker software, Intel's McAfee Labs warned in a blog post yesterday.
Google and the NYU conducted a yearlong study into the business practices of those who pay vendors to install unwanted software in their install bundles.
Spyware that was recently found to have infiltrated Vietnam Airlines has also embedded itself in the website operations of various Vietnamese institutions, warned cybersecurity firm Bkav, the Vietnam News Agency reported.
AVG malware analyst Jakub Kroustek discovered an unfinished version of a new strain of ransomware, dubbed Hitler-Ransomware.
SC Magazine Articles
- Industry pros react to Cisco, Fortinet advisories after possible Snowden NSA leak
- USAA members hit with multiple phishing attacks
- Trust exercise: Symantec's new website security expert is reaching out to hacker community
- WikiLeaks postings of Turkish emails included active links to malware
- U.S. government extends offer to protect states from electoral cyberthreats
- Microsoft Office 365 hit with massive Cerber ransomware attack, report
- CEO sacked after aircraft company grounded by whaling attack
- Microsoft warns of new, self-propagating ransomware in the wild
- Wendy's POS breach 'considerably' bigger than first thought
- The media becomes the story as hackers focus efforts on news organizations
- Twitoor first Android malware known to leverage Twitter for command and control
- Juniper confirms leaked "NSA exploits" affect its firewalls, no patch released yet
- Ransomware: The evolution of cybercrime, a roundtable
- NATO to spend €70 million on 'cyber-refresh'