Malware virus Trojan and spyware protection and removal
- September 14, 2012
The Nitol botnet controlled more than 500 strains of embedded malware that Microsoft says has been plaguing the PC supply chain.
- September 14, 2012
A new URL generation algorithm and domain obfuscation are among the new features designed to trip up malware analysis and avoid detection.
- September 07, 2012
Cybercriminals tied to the 2009 Aurora attacks have used a flurry of zero-day exploits and a new "watering hole" attack technique in targeted campaigns.
- September 05, 2012
Latest Pushdo downloader infects victim's machines with the Cutwail spam botnet, spreading phishing emails, banking Trojans and other spam messages.
- September 04, 2012
Social engineering tactics often involve email attachments targeting various industry sectors, says the security firm.
- August 28, 2012
The Java zero-day flaw affects users of Mozilla, Internet Explorer and Safari.
- August 21, 2012
W32.Disttrack, a worm that corrupts files and overwrites the MBR, further proves attackers now favor targeted malware for penetrating enterprises.
- August 17, 2012
The Microsoft Malicious Software Removal Tool release warns users of Win32/Bafruz family backdoor Trojan.
- August 09, 2012
Kaspersky Lab has exposed a new cyberespionage toolkit it says is used in nation-state-sponsored attacks targeting people in the Middle East.
- July 30, 2012
A new defensive technique that can be used in Intel-based processors could thwart memory-based return oriented programming attacks.
- July 26, 2012
Thursday's Apple tech talk marked its first public discussion about iOS security, but only covered what security researchers already know.
- July 25, 2012
Mac security vendor Intego identified the Crisis Trojan, a new Mac OSX Trojan, as a likely future weapon for targeted attacks against Apple endpoints.
- July 20, 2012
Malware is increasingly difficult to detect and analyze, experts say. Researchers will explore potential attack vectors and emerging analysis tools.
- July 18, 2012
The Mahdi Trojan contains a keylogger that can record a victim's keystrokes and upload the data to a remote server.
- July 17, 2012
Attack toolkits have grown in sophistication as cybercriminals add better code obfuscation and other techniques to avoid detection and improve attack effectiveness.