Malware

Researchers observe recently patched Adobe bug added to exploit kits

By

Researchers have indicated that a recently patched integer overflow in Adobe Flash Player has been added to exploit kits.

SEDNIT malware delivered in 'Operation Pawn Storm'

SEDNIT malware delivered in 'Operation Pawn Storm'

By

Military, governments and media from around the world are targets in a campaign identified by Trend Micro.

Malvertising impacts Yahoo, AOL visitors, spreads ransomware

Malvertising impacts Yahoo, AOL visitors, spreads ransomware

By

The malvertising campaign is serving CryptoWall 2.0, researchers at Proofpoint revealed.

Cybercriminals continue to piggyback on Ebola news

By

Email samples discovered by researchers at Trustwave reveal how attackers are infecting users with the DarkComet Remote Access Trojan.

Worm variant of Android ransomware, Koler, spreads via SMS

Worm variant of Android ransomware, Koler, spreads via SMS

By

Upon infection, the Koler variant will send an SMS message to all contacts in the device's address book.

Virtualization advancements focus on protecting data at the source, not on the device

Virtualization advancements focus on protecting data at the source, not on the device

As malware doubles on mobile devices and mobility poses a greater risk, virtualization is about protecting data at the source rather than on the device.

Adobe exploit used to spread Dyre credential stealer

Adobe exploit used to spread Dyre credential stealer

By

Users running vulnerable Adobe software could be in danger of having credentials for Bitcoin websites stolen.

Modular malware for OS X includes backdoor, keylogger components

Modular malware for OS X includes backdoor, keylogger components

By

The modular malware was named "Ventir," by researchers at Kaspersky.

Security, tech firm coalition fights Hikit actors, other advanced groups

Security, tech firm coalition fights Hikit actors, other advanced groups

By

The coalition began as an effort to stop the spread of the Hikit trojan, previously known for targeting U.S. defense contractors.

Phishing email delivers keylogger malware, also takes screenshots

Phishing email delivers keylogger malware, also takes screenshots

By

The malware has various features, including the ability to start persistently, take screenshots and bypass user access controls.

Malicious ads on YouTube direct users to Sweet Orange exploit kit

By

The campaign targeted users running vulnerable versions of Internet Explorer.

'Sandworm Team' exploits zero-day bug in espionage campaign

'Sandworm Team' exploits zero-day bug in espionage campaign

By

A group of cybercriminals believed to be Russian are exploiting a zero-day vulnerability to deliver malware and gather information from various organizations around the world.

Kmart breach likely exposed payment card data

Kmart breach likely exposed payment card data

By

Sears revealed in a filing to the SEC that Kmart systems were infected with malware "undetectable" by current AV solutions.

HP to remove digital signature that code-signed malware

By

Journalist Brian Krebs said the company is sending out advisories to clients saying it would remove the certificate after a 2010 security incident.

Dairy Queen confirms breach, Backoff malware intrusion at 395 U.S. stores

Dairy Queen confirms breach, Backoff malware intrusion at 395 U.S. stores

By

Attackers used a third-party vendor's credentials to compromise systems in 395 U.S. Dairy Queen locations and one Orange Julius site.

Suspected POS hacker Seleznev faces slew of new charges

By

Roman Seleznev is now charged in a 40-count indictment brought by a federal grand jury in Seattle.

New mobile trojan masquerading as Tic-tac-toe game targets Android devices

New mobile trojan masquerading as Tic-tac-toe game targets Android devices

By

A Tic-tac-toe game is actually a new mobile trojan being used to steal data and spy on Android devices.

Emma Watson Facebook scam infects users with malware

By

A new Facebook scam leverages the popularity of the British actress to infect users with a trojan that steals data and signs up victims to a premium SMS scam.

ATM malware 'Tyupkin' found on over 50 machines in Europe, spreads to U.S.

ATM malware 'Tyupkin' found on over 50 machines in Europe, spreads to U.S.

By

The malware allowed criminals, with physical access to ATMs, to steal millions, Kaspersky revealed.

Apple updates XProtect, blacklists iWorm variants

By

After more than 18,000 Macs were infected with iWorm malware, Apple has updated its XProtect system to identify and block certain variants.

Bash bug payload downloads KAITEN DDoS malware source code

Bash bug payload downloads KAITEN DDoS malware source code

By

The purpose is to add compromised systems to botnets that are primarily focused on launching DDoS attacks.

Chase breach affects 76 million accounts, raises questions about detection failure

Chase breach affects 76 million accounts, raises questions about detection failure

By

As the reach of a recent Chase breach grows to 76 million household and seven million business accounts, security experts call for change.

Researchers discover Mac botnet

By

Doctor Web researchers have discovered a new malware that is being used to amass Macs into a giant botnet.

ComputerCOP aimed at protecting kids is really spyware, EFF says

ComputerCOP aimed at protecting kids is really spyware, EFF says

By

The Electronic Frontier Foundation says the spyware sports a keylogger and is widely distributed by law enforcement agencies.

Researchers release BadUSB code at Derbycon

By

Two months after SR Labs demonstrated that flaws allow malware to infect USB devices, two researchers have taken the code public.

Chinese iOS trojan targets jailbroken devices

By

The trojan is known as Xsser mRAT is targeting protesters in China, but devices have to be jailbroken in order to be infected.

Malware in Mexico, Ukraine ATM attacks may be culprit in Malaysia

By

Police are not naming the malware used, but speculation casts an eye on Backdoor.Ploutus or Backdor.PadPin.

FBI to open Malware Investigator portal to security researchers

By

The portal is a virus analysis tool that examines suspicious files and shares information about them.

As EMV deadline looms, industry looks to next ATM attack front

As EMV deadline looms, industry looks to next ATM attack front

By

Next year, EMV migration in the U.S. will inevitability change fraudsters' attack methods.

Jimmy Johns' POS vendor confirms breaches at other restaurants

By

Signature Systems, Inc. confirmed that 108 other businesses were impacted by the malware installed on its systems.

Sign up to our newsletters

RECENT COMMENTS

FOLLOW US