Many major businesses and government agencies still have systems infected with the DNSChanger malware, which reroutes the victim machine to websites and online advertisements of the attackers' choosing. That may mean they could lose web connectivity.
Automated attackers are trawling the web for vulnerable WordPress blogs so they can silently redirect users to dangerous exploits. So far, however, the number of victims is in the hundreds.
Researchers warned Thursday that a recently patched vulnerability in Windows Media is being used by remote attackers to launch malware.
A new botnet made up of more than 4.5 million infected computers is "practically indestructible," according to researchers at Kaspersky Lab. But some disagree.
Researchers presenting findings on the Stuxnet worm said "This is not a teenage hacker coding in his bedroom-type operation."
Microsoft is investigating new reports that malware is propagating through USB devices, which may be linked to an unpatched vulnerability in Windows.
Microsoft on Tuesday resumed shipping a recent patch, MS10-015, through Windows Update. The fix was sidelined after Microsoft determined that it resulted in a denial-of-service condition when installed by users whose machines are infected with a rootkit known as Alureon. The revamped bulletin now contains "detection logic" to find the Alureon rookit. If it does, the computer does not load the patch. -- DK
Two Rutgers University computer science professors are calling for more research into the detection of smartphone rootkits, which cannot be found in the same as they are on desktops.
Microsoft has concluded that PCs displaying the "blue screen of death" when trying to install a February patch contain a rootkit.
On the same day that the Internet Crime Complaint Center issued an alert on the ongoing dangers of social networking fraud, a computer security researcher reported on a new Facebook threat in which scores of fake member profiles were attempting to push rogue anti-virus programs.
Researchers at Trusteer credit the trojan's morphing and rootkit capabilities with keeping it in the wild.
Next week, Microsoft will make available to consumers a new, free anti-malware service to replace its subscription model.
One week after Conficker's supposed activation date, the worm awoke from its slumber.
The website for former Beatle Paul McCartney is the latest legitimate website hacked to serve up malware.
A pesky adware trojan is continuing to leave its mark on susceptible users.
A long-standing trojan that serves as a malware-distribution service has found a new way to infect computers: via a USB stick or other removable device.
Microsoft has added detection for the infectious Srizbi malware family to its Software Removal Tool, released Tuesday with the company's monthly patches. Srizbi is a trojan downloader or rootkit that propagates through malicious emails. If recipients fall victim, their machines become part of a botnet, whose chief goal is to deliver spam. In October, Microsoft added similar detection for the Rustock bot malware. — DK
In a victory for privacy advocates, an Orlando, Fla.-based company has been ordered not to sell keylogger spyware.
Attackers are using compromised SSH keys to launch in-the-wild attacks against Linux-based computing environments, US-CERT warned Tuesday.
The security vendor's chief technology officer said today the company will withdraw from the popular VB100 anti-malware tests, launching a tirade against the testers' methodology.
IT security vendors' sole purpose is to generate revenue -- not offer complete security -- and they will only create solutions to stop dangerous threats when they are incentivized to do so, the principal security strategist for IBM Internet Security Systems said Wednesday at Interop in Las Vegas.
Microsoft has shored up its enterprise security portfolio -- and gained a toehold in the government marketplace -- with the acquisition of Komoku, a government-funded startup with products that snoop out rootkits.
Security researchers have developed a way to turn a utility for Sun Microsystems' Solaris operating system into a rootkit-like, reverse engineering tool that can be deployed to quickly locate application vulnerabilities and create exploits.
A project funded by the Department of Homeland Security promises to give security researchers a new way to kill botnets and targeted malware attacks before they infect computers.
Spammers capitalizing on nationwide interest in the Democratic presidential nomination battle are sending out messages offering a link to a "Hillary Clinton video interview" that instead launches a trojan downloader on the victim's PC.
A researcher has released exploit codes for newly discovered Linux kernel 2.6 flaws which could permit attackers to gain root-system privileges they can use to steal data or mount denials of service on Linux-based systems.
The amount of malware captured last year increased by 800 percent over 2006, researchers said this week.
A rootkit attacking Master Boot Record (MBR) - a vector used more than a decade ago on MS-DOS operating systems -- in various Microsoft Windows operating systems is spreading in the wild, according to researchers.
Cyberattackers are exploiting the assassination of former Pakistani Prime Minister Benazir Bhutto to spread malware, according to researchers at numerous anti-virus vendors.
Cyberattackers have hijacked thousands of search terms on Google, leading end-users to unexpected malware installations.
Sign up to our newsletters
SC Magazine Articles
- Study: Open Source Software use increasing in enterprises but without vulnerability monitoring
- RSA Conference 2015: Prepare for the IoT before it's too late, Sorebo warns
- 'Aaron's Law' returns to Congress
- RSA 2015: Tension continues to grow between govt, cryptographers
- CozyDuke APT group believed to have targeted White House and State Department
- Study: Conficker declared top threat of 2014, but N. America targeted mainly by AnglerEK
- RSA 2015: Straight talk about encryption, bulk surveillance and IoT
- RSA 2015: In the healthcare industry, security must innovate with business
- RSA 2015: Unintended use of aircraft systems next challenge for counterterrorism community
- RSA 2015: Bug hunting and responsible vulnerability disclosure