Security Experts:

Virus & Malware
long dotted


Hundreds of iOS apps infected with XcodeGhost malware spotted in the wild. Attackers using malicious Xcode installers to deliver malware. [Read More]
Researchers have uncovered an adware installer that uses an old trick to access the OS X keychain. [Read More]
Intel Security report explains how endpoint security products should be capable of detecting GPU malware. [Read More]
The threat actor behind the Regin cyberespionage tool is still active. Symantec discovers 49 new modules. [Read More]
Sphinx, a new variant of the Zeus banking Trojan, is up for sale on cybercrime forums. [Read More]
Russian anti-virus vendor Kaspersky Lab is denying accusations that it conducted operations designed to trick software from competing firms into classifying harmless files as malicious. [Read More]
A new version of the DGA.Changer malware uses some new techniques to trick sandbox solutions and researchers. [Read More]
Malicious iOS apps found in Hacking Team leak leverage “Masque Attacks” to steal sensitive data even from non-jailbroken devices. [Read More]
Researchers at Invincea have tested the effectiveness of an automated analysis system that focuses on the images embedded in malware. [Read More]
RIG 3.0 has been used to infect more than 1.3 million devices worldwide. The latest version is designed to prevent another source code leak. [Read More]

FEATURES, INSIGHTS // Virus & Malware

rss icon

Zeus 2.1 now boasts features that help it avoid analysis and hostile takeover from law enforcement, researchers, or competing cybercriminal organizations.
David Harley's picture
David Harley chimes in with some thoughts on the latest developments from the AMTSO and the Anti-Malware Industry.
David Harley's picture
The vulnerability in Windows Shell’s parsing of .LNK (shortcut) files presents some interesting and novel features in terms of its media lifecycle as well as its evolution from zero-day to patched vulnerability. For most of us, the vulnerability first came to light in the context of Win32/Stuxnet, malware that in itself presents some notable quirks.
David Harley's picture
The anti-malware industry sometimes sees more complicated problems than you might imagine, and they can’t all be fixed by tweaking detection algorithms or giving the marketing team a productivity bonus.
Mike Lennon's picture
Malvertising - Popular websites, blogs, and ad networks are fast becoming the preferred means of cybercriminals, identity thieves, and hackers to steal consumer information and distribute malicious content.
Markus Jakobsson's picture
Anti-virus products scan for malware in two ways. They look for sequences of bits that are found in programs that are known to be “evil” (but which are not commonly found in “good” programs)...