Security Experts:

Virus & Malware
long dotted

NEWS & INDUSTRY UPDATES

Please join Palo Alto Networks and SecurityWeek on Wednesday, July 9th at 1:00 PM ET for an informative webcast on how your organization can better detect and prevent advanced cyber attacks.
Dailymotion has addressed a malware attack that redirected visitors to the Sweet Orange Exploit kit.
According to researchers, the updated version of the MiniDuke espionage malware shares code with an older infostealer known as Cosmu.
According to researchers with EMC's RSA security division, cybercriminals armed with malware could have walked away with up to $3.75 billion.
Researchers at FireEye have found a new piece of malware that combines data theft, banking credential theft and remote access
Researchers at Kaspersky uncover an operation by cybercriminals that stole more than 500,000 euros from a bank in Europe.
Researchers at FireEye say the latest activities of the Asprox botnet are an example of a mass-targeting email operator copying APT attackers.
Seculert plays in the advanced threat protection market. SecurityWeek sat down with Dudi Matot, CEO and Co-founder to discuss the security startup.
Researchers at Lacoon Mobile Security are warning that a Linux vulnerability exploited by a tool to root Google Android phones could also be used by attackers.
A hacker made more than $600,000 in two months in the operation, according to estimates from Dell SecureWorks.

FEATURES, INSIGHTS // Virus & Malware

rss icon

Aviv Raff's picture
Just as offices need to detect break-ins to keep criminals from committing industrial espionage, enterprises need to put more focus on detecting APTs and other advanced threats to keep adversaries from their network.
Michael Callahan's picture
While obscuring website code, server architecture, and security mechanisms doesn’t provide bullet-proof security on its own, it is actually pretty effective.
Wade Williamson's picture
Even with the basics covered, we also have to be on the lookout for unknown threats and anomalies in our networks that can be an indicator of compromise.
Jon-Louis Heimerl's picture
Was the Mayan Apocalypse was a myth? Since I am a security geek, I just happen to talk about security a lot. What are some security myths I have heard in my conversations with some very bright people?
Andrew Jaquith's picture
As with most stories Mac-related, the malware-is-finally-coming story attracted a lot of press. But the desktop Mac OS might not be attractive to attackers as you might think.
Ram Mohan's picture
We still don't know who created Conficker or what that person’s motivations were. What we do know: Conficker could have proved much more damaging than it ultimately did, but the threat has not entirely disappeared.
Mike Lennon's picture
Enjoy this selection of top picks for 2010, listed in no particular order. Happy New Year!
Zeus 2.1 now boasts features that help it avoid analysis and hostile takeover from law enforcement, researchers, or competing cybercriminal organizations.
David Harley's picture
David Harley chimes in with some thoughts on the latest developments from the AMTSO and the Anti-Malware Industry.
David Harley's picture
The vulnerability in Windows Shell’s parsing of .LNK (shortcut) files presents some interesting and novel features in terms of its media lifecycle as well as its evolution from zero-day to patched vulnerability. For most of us, the vulnerability first came to light in the context of Win32/Stuxnet, malware that in itself presents some notable quirks.