Security Experts:

Virus & Malware
long dotted


Malware actors are exploiting the Flash Player vulnerability, which affects machines running Windows, Mac OS X, Linux and Chrome OS. [Read More]
The Chinese computer manufacturer is warning that multiple vulnerabilities in the "Lenovo Solution Center" could expose millions of users to malicious hacker attacks. [Read More]
The information stealer malware known as Fareit and Pony Loader has been delivered using Windows PowerShell [Read More]
Hybrid Trojan GozNym spotted targeting banks in Europe using a new type of redirection attack [Read More]
Malicious actors abused PowerShell and Google Docs to deliver the reconnaissance Trojan known as Laziok [Read More]
State-sponsored threat actors in Asia deliver RATs by injecting the payload directly into memory to avoid detection [Read More]
Researchers discovered Panda Banker, a new banking Trojan that borrows code from the notorious Zeus [Read More]
New variant of the NewPosThings PoS malware exfiltrates payment card data via DNS [Read More]
GozNym — hybrid Trojan created from a combination of Gozi and Nymaim source code used by cybercriminals to target US and Canadian banks [Read More]
Researchers have identified possible links between Rokku and Chimera, and between PowerWare and PoshCoder ransomware. [Read More]

FEATURES, INSIGHTS // Virus & Malware

rss icon

Zeus 2.1 now boasts features that help it avoid analysis and hostile takeover from law enforcement, researchers, or competing cybercriminal organizations.
David Harley's picture
David Harley chimes in with some thoughts on the latest developments from the AMTSO and the Anti-Malware Industry.
David Harley's picture
The vulnerability in Windows Shell’s parsing of .LNK (shortcut) files presents some interesting and novel features in terms of its media lifecycle as well as its evolution from zero-day to patched vulnerability. For most of us, the vulnerability first came to light in the context of Win32/Stuxnet, malware that in itself presents some notable quirks.
David Harley's picture
The anti-malware industry sometimes sees more complicated problems than you might imagine, and they can’t all be fixed by tweaking detection algorithms or giving the marketing team a productivity bonus.
Mike Lennon's picture
Malvertising - Popular websites, blogs, and ad networks are fast becoming the preferred means of cybercriminals, identity thieves, and hackers to steal consumer information and distribute malicious content.
Markus Jakobsson's picture
Anti-virus products scan for malware in two ways. They look for sequences of bits that are found in programs that are known to be “evil” (but which are not commonly found in “good” programs)...