Trojans

Stats confirm that trojans spreading, malware being built at record rates

Stats confirm that trojans spreading, malware being built at record rates

By

PandaLabs confirms what many of us already assumed to be fact: Malware is growing at never-before-seen levels. But it's got the statistics to back it up.

Microsoft releases urgent browser patch to curb online attacks

By

The most critical flaw could lead to the installation of the backdoor trojan Poison Ivy on victims' machines.

Living in a world of trust

Living in a world of trust

You can protect your brand's online reputation, says ZeroSpam's David Poellhuber.

Researchers in "Crisis" mode over virtual spyware find

By

Security firms are analyzing a rare piece of data-stealing and web traffic-tracking malware that is able to spread onto virtual machines from the host operating system.

Windows bug, patched in April, continues to wreak havoc

By

A Windows vulnerability that Microsoft patched back in April continues to be used in targeted attacks against political, industrial and defense organizations.

Grum botnet dead after remaining servers are shut off

By

One of the world's largest spam botnets, responsible for as much as a third of all unwanted mail sent as recently as last week, is finally offline, according to security firm FireEye.

SpyEye purveyors get prison time in the U.K.

By

Three men who used the SpyEye trojan to break into online bank accounts have been sentenced to prison in the U.K.

New spy toolkit sets sights on Syrian activists

By

Protesters in Syria wanting to overthrow the Assad regime are being targeted in government-backed espionage efforts.

Report: Like Stuxnet, the U.S. also built Flame virus

Suspicions that the sophisticated espionage toolkit Flame was created by the same authors as Stuxnet are true, according to a published report.

Offensive line: Fighting back against hackers

Offensive line: Fighting back against hackers

By

The only way to gain the upper hand on today's advanced adversaries is by being proactive -- even aggressive, a tactic that can take many forms, says Joel Yonts, CISO of an automotive supply company.

2012 Olympics malware already circulating

By

Researchers at security firm F-Secure said this week they have spotted a malicious PDF making the rounds that opens a legitimate copy of the Games' schedule, but in the background it tries to connect to a malicious website.

Google to help rid PCs of trojan that will prevent web access

By

With a July 9 deadline looming for machines infected with the DNSChanger trojan to still be able to access the internet, Google is lending a helping hand to inform users of compromise.

Microsoft hands out more Duqu fixes despite prior patch

By

Just when you thought all of the windows that control system recon trojan Duqu used to propagate had been roped off, the software giant releases a new set of fixes.

Trojan designed to take screenshots of hotel payment apps

By

A new development in the criminal underground is to peddle trojans that steal credit card data from hotels.

Roughly 140K Flashback-infected computers remain

By

Symantec analysis of the botnet shows that many computers remain compromised with the trojan, though hundreds of thousands have been cleaned, and the infrastructure contains a Twitter communication apparatus.

Third Apple Java update rids infections and turns off Java

By

Apple has released a third update related to Flashback, but this time, the patch comes with a detection and removal capability for the prolific trojan, and disables Java by default.

"Flashback" trojan targets Mac computers

By

A live exploit is making the rounds that takes advantage of a bug in Java, which has already been patched, but hasn't yet made its way to Mac OS X users.

Trojan targets Tibetan activist groups that use Macs

By

Researchers have uncovered a rare instance of so-called espionage malware for the Mac OS X platform.

Duqu variant uncovered

By

The year's first variant of the notorius W32.Duqu, a trojan that seems intended for cyber war, has been discovered by Symantec researchers.

Trojan appears that leverages patched Microsoft Office flaw

By

The exploit, which is being used in targeted attacks, arrives as an email that contains a Microsoft Word file and a separate DLL file, a rare combination considering DLL files are not typically sent over email.

Google won't pull Android apps deemed malicious

By

Symantec is trying to call attention to 13 applications that have showed up in the official Android Market over concerns that they contain software development tools that enable the theft of data.

FINRA advises brokers to bulk up security

By

The self-regulating authority of Wall Street is warning securities firms about a rise in customers' email accounts being hacked to deliver bogus funds transfer requests.

Just-patched critical Microsoft bug under attack

By

Researchers warned Thursday that a recently patched vulnerability in Windows Media is being used by remote attackers to launch malware.

Study: BlackHole appears, Conficker remains

By

Eighty-five percent of all malware is web-based, and some 30,000 websites are newly infected with malicious code each day, according to Sophos' "Security Threat Report 2012."

Android app claims to be Madden 12 video game

By

With the Super Bowl less than two weeks away, Symantec researchers said Tuesday that have spotted a malicious application in unofficial Android markets claiming to offer a version of the popular video game Madden NFL 12.

Lockheed Martin hit, but not breached, with Adobe zero-day

By

Defense contractors appear to be the prime target of sophisticated malware that attempts to take advantage of an unpatched flaw in Adobe Reader and Acrobat software.

Duqu perpetrators wipe command servers of evidence

By

On Oct 20, just two days after researchers released details about the Duqu malware, its creators scrubbed all the files from their command-and-control servers in an effort to conceal their identity.

Preparing for mobile security emergencies

Preparing for mobile security emergencies

Mobile malware authors have skipped the rudimentary phase and are immediately creating threats that mimic complex malicious code common in the traditional PC environment. But defense technologies are countering with sophistication of their own.

In the vault: The Coastal Bank and IronKey

In the vault: The Coastal Bank and IronKey

By

A Georgia bank found a tool to protect financial transactions and payments...while meeting compliance demands, reports Greg Masters.

ACH debit transfer emails leading to malware

By

Attackers have been circulating a trojan via email messages with subjects such as "ACH payroll payment was not accepted by Central Trust and Savings Bank."

Sign up to our newsletters

RECENT COMMENTS

FOLLOW US