Articles about Malware
Far beyond the capabilities of traditional cybercriminals, The Equation Group's EquationDrug platform is used to target select victims worldwide.
The vulnerability, now patched, had the potential to affect any app that uses the SDK, allowing a cyberattacker to steal potentially sensitive information and inject malicious data.
Kaspersky has unearthed an Android-targeted Trojan, dubbed Podec, that can trick the CAPTCHA image verification system into thinking it is human.
Sensitive data held by the university has been compromised -- including the Social Security numbers of students and employees.
A collection of notable security news items for the week ending March 6, 2015. Covers enterprise, controversies, application and mobile security, malware, reports and more.
Adobe, maker of software including Flash and Adobe reader, is catching up to the times and has launched a vulnerability disclosure program -- but something may be missing.
FireEye's Dave Merkel said investment in technology, intelligence, and expertise will ensure that online attacks become 'manageable' for businesses.
A collection of notable security news items for the week ending February 27, 2015. Covers enterprise, controversies, application and mobile security, malware, reports and more.
A critical security flaw in a plugin called WP-Slimstat is to blame.
Lenovo is still smarting from the Superfish media storm, but CTO Peter Hortensius says the firm is working to fix its battered reputation.
Zero Day Weekly: Lenovo's poison Superfish, Netgear vuln, SIM card spying, Obama's encryption follies
A collection of notable security news items for the week ending February 20, 2015. Covers enterprise, controversies, application and mobile security, malware, reports and more.
Security experts say The Equation Group surpasses every other threat actor known in complexity and sophistication.
A collection of notable security news items for the week ending February 13, 2015. Covers enterprise, controversies, application and mobile security, malware, reports and more.
Around 16 million mobile devices worldwide were hit by malware as of the end of 2014, while attacks on communications networks rose during the year, according to new research by Alcatel-Lucent.
Symantec has explored the realm of phishing kits and how they can be used to conduct professional-looking campaigns against unsuspecting victims.
Want proof that the bad guys are starting to target Mac users? Take a look at this series of screens, which show an attempt to convince a user to install a fake antivirus program that has a nasty payload
If you think switching to Google Chrome will protect you from socially engineered malware attacks, think again.
The fallout from the data breach of US marketing firm Epsilon was massive. Some of the world's largest companies were forced to apologise, as customer details stored within Epsilon were stolen by hackers.
Sophos announced its first free business-strength antivirus program for Macs. See how it works on real malware.
This gallery offers insights into the consumer security industry, the Freemium business model, details some of the current trends within the antivirus industry, and explains the Avast! Antivirus business model, user demographics and market share.
With Avast! Antivirus 5.1 scheduled for release in Q4, 2010, the following slides offer a perspective into some of the new features, and improvements to be introduced in version 5.1.
With over 100 million users internationally, Avast! Antivirus reliance on the Freemium business model, has offered the company an unprecedented opportunity for a cost-effective worldwide market penetration. At a recent PR event in Prague, the Czech Republic, Avast! executives explained this business model, and offered insights into some of the current trends within the antivirus market.
June's cyber threat landscape gallery, features images from the malware, spam, phishing and crimeware campaigns that took place during the month. See also: Image Gallery: April's cyber threat landscape
Facebook phishing campaigns serving ZeuS crimeware, new Mac OS X malware variant, yet another cyber espionage network exposed, next to several reports detailing Opt-In botnets and how outdated vulnerabilities drive the growth of cybercrime - April, 2010 was a busy month for the security community.
In need of a fresh example that cybercriminals are actively looking for ways to monetize infected Mac OS X hosts? Early-stage discussions at several web forums, including a PoC (proof of concept, source code included) as well as the following potential layouts speak for themselves.Read the article: Mac OS X SMS ransomware - hype or real threat?
McAfee Total Protection 2010 is the latest in McAfee's security stable to offer all the bells, whistles and options that the company can squeeze into one security suite. This program is nothing if not extensive, as the following screenshots show.
The gang behind the Koobface botnet is periodically updating the template it relies on for infecting new years. Here are some of the most popular ones introduced by the gang throughout the year.
Microsoft has launched a new free security package today dubbed Microsoft Security Essentials.
This week Symantec made beta versions of its flagship Norton Internet Security 2010 and Antivirus 2010 products available for testing. We put NIS 2010 through its paces to see how it stacks up.
Taking a look at Microsoft Security Essentials, a free security product from Microsoft.