Security Experts:

Virus & Malware
long dotted


Researchers at ESET pulled the covers back on malware that infected thousands of servers running the Linux and FreeBSD operating systems.
Researchers with EMC's RSA division uncovered ties between PoSeidon and an attack that may be part of an attempt to compromise a supply chain.
Trend Micro has published a report detailing RawPOS, an old point-of-sale malware that has been used recently in attacks aimed at hotels, resorts and casinos.
SSDP reflection amplification attacks continued their dramatic rise during the first quarter of 2015, according to Arbor Networks.
Security experts discuss social engineering techniques and how enterprises should consider crafting their security strategy to respond.
Based on their analysis of the Dorkbot, RageBot, Phorpiex, and IRCBot.HI botnets, Zscaler researchers have determined that IRC-based botnets are still effective and they continue to evolve.
Invincea has enhanced its offerings with new threat identification and response capabilities added to its container-based endpoint protection solution.
Operation Pawn Storm continues to evolve its tactics to infect organizations all over the world.
A new drive-by-download attack vector dubbed "drive-by-login" is used to deliver malware only to targeted users. Researchers expect an increase in such attacks.
Researchers have conducted a detailed analysis of AlienSpy, a Java-based remote access Trojan (RAT) that has been used by malicious actors to target regular Internet users and enterprises worldwide.

FEATURES, INSIGHTS // Virus & Malware

rss icon

Zeus 2.1 now boasts features that help it avoid analysis and hostile takeover from law enforcement, researchers, or competing cybercriminal organizations.
David Harley's picture
David Harley chimes in with some thoughts on the latest developments from the AMTSO and the Anti-Malware Industry.
David Harley's picture
The vulnerability in Windows Shell’s parsing of .LNK (shortcut) files presents some interesting and novel features in terms of its media lifecycle as well as its evolution from zero-day to patched vulnerability. For most of us, the vulnerability first came to light in the context of Win32/Stuxnet, malware that in itself presents some notable quirks.
David Harley's picture
The anti-malware industry sometimes sees more complicated problems than you might imagine, and they can’t all be fixed by tweaking detection algorithms or giving the marketing team a productivity bonus.
Mike Lennon's picture
Malvertising - Popular websites, blogs, and ad networks are fast becoming the preferred means of cybercriminals, identity thieves, and hackers to steal consumer information and distribute malicious content.
Markus Jakobsson's picture
Anti-virus products scan for malware in two ways. They look for sequences of bits that are found in programs that are known to be “evil” (but which are not commonly found in “good” programs)...