Malware

Android trojan spreads through Cutwail spam botnet

By

Attackers use phishing emails, which include links to a fake Adobe Flash update, to lure victims into installing the Stels trojan.

Roughly 20 charged in Eastern Europe with building Carberp banking trojan

By

Law enforcement in Russian and Ukraine have dealt a major blow to a prolific banking malware operation.

Malware tries to invade technology companies once every 60 seconds

Malware tries to invade technology companies once every 60 seconds By

No matter the industry, organizations are facing a flurry of sophisticated attacks, with the main goal being to hijack intellectual property, according to new findings from security firm FireEye.

Android malware targeting Tibetans has state-sponsored fingerprints

By

New clues turned up by researchers at the University of Toronto show that an Android malware spy campaign appears to be the work of Chinese hackers, possibly with the assistance of the nation's government or a major corporation.

Cyber war, this is not

Cyber war, this is not

Espionage and fraud in cyber is not an armed conflict, says SystemExpert's Jonathan Gossels.

Suspect everything: Advanced threats in the network

Suspect everything: Advanced threats in the network By

Are there ways to catch sophisticated malware that hides in trusted processes and services? Deb Radcliff finds out.

New study finds malware variants skirting AV, mostly delivered via web

New study finds malware variants skirting AV, mostly delivered via web By

As the debate on the usefulness of anti-virus continues, recent research reveals that a majority of malware is delivered via web browsing, skirting AV along the way.

Spear phishes used to infect South Korean corporate networks

By

Security researchers have found evidence that, not surprisingly, social engineering tactics were leveraged by the attackers, who set their malware to "go off" three days after reaching victims.

VSkimmer trojan steals card data on point-of-sale systems

VSkimmer trojan steals card data on point-of-sale systems By

The trojan was recently a topic of discussion on an underground Russian forum, researchers found.

Yontoo adware used to cash in on clicks targets Mac and Windows users

By

Saboteurs are spreading the Yontoo trojan, which infects computers so they display certain advertisements to infected users.

South Korean corporations hit by widespread attack that wiped data and shut down systems

By

Researchers at Symantec believe a trojan called "Jokra" was used in the attacks. Neighboring North Korea is considered a suspect, but there's no evidence suggesting it is to blame.

Malware places personal info of 25k at Massachusetts university at risk

By

A worm detected on a school server at Salem State University caused a breach.

Small businesses in crosshairs of new malware-laden email ruse

By

The Federal Trade Commission and the Better Business Bureau are alerting businesses about the new threat.

MiniDuke espionage ring began earlier than first reports suggest

By

Attackers behind the MiniDuke spy campaign have targeted government entities and other organizations around the world since at least 2011.

News briefs: NY Times and Twitter hacked, cyber security executive order, and more

By

Security incidents at the U.S. Department of Health and Human Services and Zaxby's Franchising, and more.

RSA 2013: Foreign cyber spies setting eyes on U.S. solar energy industry

By

Researchers at AlienVault are tracking the moves of a highly skilled espionage group, likely nation-state backed and operating out of China, that has hit two U.S. manufacturers of solar panels.

Adobe hurries update to fix Flash zero-day vulnerabilities

By

Adobe this week released an update to its Flash Player to close three vulnerabilities, two of which are under active attack.

RSA 2013: Hackers will get in, so spend the money on pushing them out

By

With the rise of state-sponsored espionage and advanced persistent threats, security pros must divert their attention from deploying perimeter-focused security toward raising the cost for attackers once they're already inside.

Study finds that growth of security workers is needed, though budget constraints remain a hurdle

By

Robust growth in the information security profession is a sign of economic health in the overall economy, according to a new report from (ISC)2. And personnel skilled in emerging technologies and security as a business will be the ones who excel.

RSA 2013: Symantec shows proof that Stuxnet has been striking since at least 2007

By

The security company has unearthed an earlier version of Stuxnet that it is calling Stuxnet 0.5. It was less sophisticated, but still could have inflicted serious damage upon Iranian nuclear plants.

Malware once used exclusively for bank fraud is finding a new mission

By

Cyber criminals are repurposing data-stealing trojans, once used primarily to steal banking information, to collect intellectual property, which can be sold for a higher price tag, according to a McAfee study.

Adobe updates Flash to address targeted exploits

By

The software company has updated its ubiquitous Flash software because of two pressing zero-day vulnerabilities.

Hacker in $14M click-fraud scam pleads guilty

By

Valeri Aleksejev, an Estonian, pleaded guilty for his role in "Operation Ghost Click," where DNSChanger malware infected four million computers worldwide.

Video: The prevalence of spam

By

In this video, Tom Buoniello, senior vice president of product management at AppRiver sits with Greg Masters, managing editor at SC Magazine, to discuss this prevalent threat and what users can do to protect themselves.

Big Data can fight malware

Big Data can fight malware

The ever-changing nature of malware generates anomalous network behavior that can be detected by leveraging large corpuses of data collected from multiple observation points.

Battle lines drawn: Nation-state threats

Battle lines drawn: Nation-state threats

The United States has established itself as a major force in a new era of combat, but what repercussions do state-sponsored actions in cyber space have on all of us?

Wall Street Journal also a victim of espionage

By

Less than a day after The New York Times revealed that its reporters were targeted by Chinese hackers, The Wall Street Journal disclosed on Thursday that its systems were also breached by attackers from China wanting to observe the newspaper's coverage of the country.

New York Times breach opens anti-virus, attribution debate

By

The New York Times Co. is the latest victim of an advanced persistent threat attack after the paper disclosed that hackers roamed its systems for four months, looking for correspondence related to a single story.

U.S. hosts most botnet command servers worldwide

By

The U.S. hosts 631 active command-and-control hubs for botnets, according to McAfee.

Trojan preys on victims fearful of missing a FedEx delivery

By

The delivery service has noticed an influx of scam emails delivering malware to users.

Sign up for our newsletters

POLL