News

Malware virus Trojan and spyware protection and removal

  • April 08, 2015 08 Apr'15

    Dyre malware returns to rob banks of millions

    Financial malware Dyre, in tandem with social engineering, was used in a new campaign to steal millions from financial institutions, according to IBM researchers.

  • March 27, 2015 27 Mar'15

    Is the RSA 2015 'booth babe' ban a win for women in security?

    News roundup: The ban of "booth babes" at RSA Conference 2015 has been met with praise; does it equal an increase of women in infosec? Plus: Cyberthreat data-sharing bill advances; Flash flaw exploited days after patching; new twist on Google Play ...

  • March 24, 2015 24 Mar'15

    BandarChor: New ransomware based on old malware family emerges

    Antivirus vendor F-Secure discovered BandarChor, a type of ransomware based on an existing malware family.

  • March 13, 2015 13 Mar'15

    Hillary Clinton email debate highlighted by security mistakes

    News roundup: Hillary Clinton's decision to use a private email domain and server has created a firestorm over her email security mistakes. Plus: OpenSSL audit, Blue Coat acquisition, more Equation details emerge.

  • March 06, 2015 06 Mar'15

    Adobe's new twist on bug bounty programs: No cash for bug hunters

    News roundup: Bug bounty programs can offer big rewards to researchers, unless Adobe is handing out the prizes. Plus: Signal 2.0 encryption app; app cloning risk increasing; Angler adopts 'domain shadowing' capability.

  • February 27, 2015 27 Feb'15

    Data breach consequences: Get breached, make money?

    News roundup: Data breaches aren't associated with soaring stock prices, but recent examples show breaches may boost stocks. Plus: Gemalto confirms possibility of GHCQ/NSA hack; Target breach costs company $162 million; Superfish swims on.

  • February 24, 2015 24 Feb'15

    Macro viruses reemerge in Word, Excel files

    Macro viruses haven't been popular since the early 2000s, but recent malware discoveries indicate that macro-infected Word and Excel files are on the rise.

  • February 20, 2015 20 Feb'15

    Maintaining vendor trust proves tough for Lenovo, Microsoft

    News roundup: Amid hidden add-ons, discontinued services and walled gardens, vendor trust proves elusive for several high-profile tech firms. Plus: Evidence ties North Korea to Sony Pictures hack; card brands boost cybersecurity; and cookies that ...

  • January 23, 2015 23 Jan'15

    CryptoWall 3.0: Ransomware returns, adopts I2P

    Shortly after CryptoWall began using TOR to conduct transcations, a new version of the ransomware, dubbed CryptoWall 3.0, has begun using I2P.

  • January 16, 2015 16 Jan'15

    Hardware security issues prove tough to find, harder to fix

    News roundup: Recently discovered firmware flaws highlight the challenges posed by hardware security. Plus: Heartland's breach warranty; RSA's overhaul; and Download.com's app (in)security.

  • January 09, 2015 09 Jan'15

    Sony Pictures hack recap: Experts debate North Korea's role

    News roundup: The FBI maintains North Korea was behind the Sony Pictures hack, in spite of naysayers. Plus: Malware campaign attributed to Russia; new Mac OS X bootkit; cyberattack causes physical damage.

  • October 03, 2014 03 Oct'14

    Palo Alto NGFW fails NSS Labs report, war of words ensues

    News roundup: Palo Alto's next-generation firewall fared poorly in a recent NSS Labs report, leading to a testy back-and-forth about NGFW testing. Plus: Mitnick selling zero days; EMET bypassed, again; iThemes stored plaintext passwords.

  • July 24, 2014 24 Jul'14

    How the CryptoLocker ransomware was defeated with its own DGA

    Preview: At Black Hat USA, experts will detail the steps taken by the security community and law enforcement to put down the infamous CryptoLocker ransomware.

  • June 12, 2014 12 Jun'14

    Pandemiya banking malware emerges as Zeus-level threat

    RSA researchers say the costly Pandemiya banking malware was written entirely from scratch, a dangerous oddity in the world of malware.

  • July 25, 2012 25 Jul'12

    Crisis Trojan, new Mac OSX Trojan, considered a low risk for now

    Mac security vendor Intego identified the Crisis Trojan, a new Mac OSX Trojan, as a likely future weapon for targeted attacks against Apple endpoints.

  • July 09, 2012 09 Jul'12

    DNSChanger malware problems unlikely

    DNSChanger infections have declined precipitously, but remaining systems could have Internet access turned off today.

  • December 30, 2011 30 Dec'11

    Multifunctional malware, staged drive-by attacks to rise in 2012

    Malware toolkits are being programmed with attacks that make the most business sense, say security experts. Automated toolkit users will have new capabilities to target specific groups and organizations.

  • April 04, 2011 04 Apr'11

    RSA SecurID breach began with spear phishing attack

    Two waves of email attacks targeted small groups of RSA employees, the company said in a blog post last week revealing the first details of the attack since the breach was announced March 22.

  • July 30, 2009 30 Jul'09

    Machiavelli Mac OS X rootkit unveiled at Black Hat

    Researcher Dino Dai Zovi presented details on a rootkit called Machiavelli, a proof-of-concept Mac OS X rootkit that seeks to dent what many Mac enthusiasts believe is an impervious OS.

  • August 31, 2005 31 Aug'05

    Myfip's Titan Rain connection

    LURHQ researchers say the Myfip worm is a good example of the malcode Chinese hackers are using in the so-called Titan Rain attacks against U.S. government networks.

  • July 15, 2005 15 Jul'05

    Case study: Hardcore spyware among the 'missing'

    The IT director for the National Center for Missing & Exploited Children had a severe spyware problem that couldn't be cured by keeping his employees away from child pornography. Find out what he did instead.

  • March 04, 2004 04 Mar'04

    Dangers of .zip files

    Reader inquiries about security issues surrounding .zip files prompted a Q&A with Wild List moderator Bruce Hughes, who cites more than 40 worms since 1999 that have taken advantage of the compressed file format to spread.

  • August 19, 2003 19 Aug'03

    Benevolent Nachi worm doing more harm than good

    The Nachi worm, which tries to delete the Lovsan worm and patch infected systems, is clogging internal networks with trash traffic.

  • January 22, 2003 22 Jan'03

    Remote Access Trojans warrant attention

    Smell a RAT? Some security experts predict you will at some point during 2003. Remote access Trojans often leave backdoors wide open for attackers to prowl through your company's networks or systems.

  • December 20, 2002 20 Dec'02

    The virus name game

    If you're a virus writer, don't expect to have your nefarious work named after your favorite dog, diet drink or exotic dancer. Antivirus researchers have first dibs on virus names.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close