Security Experts:

Virus & Malware
long dotted


Google Android users in Europe are being targeted with malware disguised as mobile security software from Kaspersky Lab.
Researchers have analyzed a remote administration tool (RAT) that's capable of using popular webmail and other types of services for command and control (C&C) communications.
USB controller chips in peripherals can be reprogrammed to spoof other devices and there's little or no protection to protect against it.
Kaspersky Lab dives deeper into an attack campaign also known as 'Energetic Bear' that has been targeting industries ranging from the energy sector to the manufacturing business since 2010.
Several of the most popular antivirus products contain vulnerabilities that can be exploited locally or remotely, a security researcher revealed at the SyScan 360 security conference in Beijing earlier this month.
The Neverquest malware has been updated to target more financial institutions in Japan.
The crash of the Malaysia Airlines flight MH17 in eastern Ukraine on June 17 continues to make headlines, making it a perfect event for cybercriminals to leverage in their malicious campaigns.
According to new research from Incapsula, 34.3 percent of all the fake Googlebots identified were overtly malicious, with 23.5 percent of these being used for Layer 7 DDoS attacks.
Security researchers have conducted an in-depth analysis of both the client side and the command and control (C&C) servers of the malware dubbed "Mayhem."
Researchers at Sentinel Labs say the malware is believed to originate from Russia and may have been designed to target government organizations.

FEATURES, INSIGHTS // Virus & Malware

rss icon

David Harley's picture
The vulnerability in Windows Shell’s parsing of .LNK (shortcut) files presents some interesting and novel features in terms of its media lifecycle as well as its evolution from zero-day to patched vulnerability. For most of us, the vulnerability first came to light in the context of Win32/Stuxnet, malware that in itself presents some notable quirks.
David Harley's picture
The anti-malware industry sometimes sees more complicated problems than you might imagine, and they can’t all be fixed by tweaking detection algorithms or giving the marketing team a productivity bonus.
Mike Lennon's picture
Malvertising - Popular websites, blogs, and ad networks are fast becoming the preferred means of cybercriminals, identity thieves, and hackers to steal consumer information and distribute malicious content.
Markus Jakobsson's picture
Anti-virus products scan for malware in two ways. They look for sequences of bits that are found in programs that are known to be “evil” (but which are not commonly found in “good” programs)...