Attackers use phishing emails, which include links to a fake Adobe Flash update, to lure victims into installing the Stels trojan.
Law enforcement in Russian and Ukraine have dealt a major blow to a prolific banking malware operation.
April 03, 2013
No matter the industry, organizations are facing a flurry of sophisticated attacks, with the main goal being to hijack intellectual property, according to new findings from security firm FireEye.
New clues turned up by researchers at the University of Toronto show that an Android malware spy campaign appears to be the work of Chinese hackers, possibly with the assistance of the nation's government or a major corporation.
April 01, 2013
Espionage and fraud in cyber is not an armed conflict, says SystemExpert's Jonathan Gossels.
April 01, 2013
Are there ways to catch sophisticated malware that hides in trusted processes and services? Deb Radcliff finds out.
March 27, 2013
As the debate on the usefulness of anti-virus continues, recent research reveals that a majority of malware is delivered via web browsing, skirting AV along the way.
Security researchers have found evidence that, not surprisingly, social engineering tactics were leveraged by the attackers, who set their malware to "go off" three days after reaching victims.
March 22, 2013
The trojan was recently a topic of discussion on an underground Russian forum, researchers found.
Saboteurs are spreading the Yontoo trojan, which infects computers so they display certain advertisements to infected users.
Researchers at Symantec believe a trojan called "Jokra" was used in the attacks. Neighboring North Korea is considered a suspect, but there's no evidence suggesting it is to blame.
A worm detected on a school server at Salem State University caused a breach.
The Federal Trade Commission and the Better Business Bureau are alerting businesses about the new threat.
Attackers behind the MiniDuke spy campaign have targeted government entities and other organizations around the world since at least 2011.
Security incidents at the U.S. Department of Health and Human Services and Zaxby's Franchising, and more.
Researchers at AlienVault are tracking the moves of a highly skilled espionage group, likely nation-state backed and operating out of China, that has hit two U.S. manufacturers of solar panels.
Adobe this week released an update to its Flash Player to close three vulnerabilities, two of which are under active attack.
With the rise of state-sponsored espionage and advanced persistent threats, security pros must divert their attention from deploying perimeter-focused security toward raising the cost for attackers once they're already inside.
Robust growth in the information security profession is a sign of economic health in the overall economy, according to a new report from (ISC)2. And personnel skilled in emerging technologies and security as a business will be the ones who excel.
The security company has unearthed an earlier version of Stuxnet that it is calling Stuxnet 0.5. It was less sophisticated, but still could have inflicted serious damage upon Iranian nuclear plants.
Cyber criminals are repurposing data-stealing trojans, once used primarily to steal banking information, to collect intellectual property, which can be sold for a higher price tag, according to a McAfee study.
The software company has updated its ubiquitous Flash software because of two pressing zero-day vulnerabilities.
Valeri Aleksejev, an Estonian, pleaded guilty for his role in "Operation Ghost Click," where DNSChanger malware infected four million computers worldwide.
In this video, Tom Buoniello, senior vice president of product management at AppRiver sits with Greg Masters, managing editor at SC Magazine, to discuss this prevalent threat and what users can do to protect themselves.
February 01, 2013
The ever-changing nature of malware generates anomalous network behavior that can be detected by leveraging large corpuses of data collected from multiple observation points.
February 01, 2013
The United States has established itself as a major force in a new era of combat, but what repercussions do state-sponsored actions in cyber space have on all of us?
Less than a day after The New York Times revealed that its reporters were targeted by Chinese hackers, The Wall Street Journal disclosed on Thursday that its systems were also breached by attackers from China wanting to observe the newspaper's coverage of the country.
The New York Times Co. is the latest victim of an advanced persistent threat attack after the paper disclosed that hackers roamed its systems for four months, looking for correspondence related to a single story.
The U.S. hosts 631 active command-and-control hubs for botnets, according to McAfee.
The delivery service has noticed an influx of scam emails delivering malware to users.