Security Experts:

Virus & Malware
long dotted


One of the vulnerabilities exploited by the notorious Stuxnet malware still appears to be an open hole on many machines, according to Kaspersky Lab.
New research from Kaspersky Lab shows that the attackers have infected more than 10,000 users
Google added a new alert to bolster its Safe Browsing service.
Google is counting HTTPS use in its search engine rankings, and wants to promote HTTPS use around the Web.
Two of the nine bulletins are rated critical, according to Microsoft.
Synology responded to user reports of a ransomware attack that encrypted files and demanded 0.6 Bitcoins - equivalent today to roughly $346 USD - in ransom.
FireEye and Fox-IT have teamed up to provide a new service to assist users whose computers have been infected with the notorious CryptoLocker ransomware.
After analyzing malicious traffic from its customers' networks, Cisco found that roughly 94 percent of them had issued DNS requests to hostnames with IP addresses associated with the distribution of malware that incorporates man-in-the-browser.
Google Android users in Europe are being targeted with malware disguised as mobile security software from Kaspersky Lab.
Researchers have analyzed a remote administration tool (RAT) that's capable of using popular webmail and other types of services for command and control (C&C) communications.

FEATURES, INSIGHTS // Virus & Malware

rss icon

David Harley's picture
The vulnerability in Windows Shell’s parsing of .LNK (shortcut) files presents some interesting and novel features in terms of its media lifecycle as well as its evolution from zero-day to patched vulnerability. For most of us, the vulnerability first came to light in the context of Win32/Stuxnet, malware that in itself presents some notable quirks.
David Harley's picture
The anti-malware industry sometimes sees more complicated problems than you might imagine, and they can’t all be fixed by tweaking detection algorithms or giving the marketing team a productivity bonus.
Mike Lennon's picture
Malvertising - Popular websites, blogs, and ad networks are fast becoming the preferred means of cybercriminals, identity thieves, and hackers to steal consumer information and distribute malicious content.
Markus Jakobsson's picture
Anti-virus products scan for malware in two ways. They look for sequences of bits that are found in programs that are known to be “evil” (but which are not commonly found in “good” programs)...