Security Experts:

Virus & Malware
long dotted


Experts share their opinion on Duqu 2.0. Thoughts on the malware's level of sophistication, prevention and detection methods, similarities with other attacks, and attribution.
Researchers at Raytheon|Websense have identified a malvertising campaign that may have impacted millions of visitors to sites ranging from CNN Indonesia to users of the Bejewled Blitz game on Facebook.
The attack group behind the Duqu platform is back - and this time, they are even more sophisticated, according to Kaspersky Lab.
IBM Security researchers spotted a new version of the banking Trojan Tinba that is more effective and resilient. Users in Poland, Italy, Germany and Netherlands targeted.
Some organizations still haven't removed Stuxnet from their computers. Infections spotted in India, Iran and Indonesia.
MalumPOS malware targets PoS systems running Oracle's Micros platforms. The threat disguises itself as NVIDIA display driver components.
Victims of the Locker ransomware can recover their files for free. The decryption keys have been made available by someone claiming to be the malware's author.
Amateurish cybercriminal from Nigeria triggered Rombertik's MBR overwrite mechanism, says ThreatConnect.
The worm is being used to commit fraud on social networks such as Facebook and Twitter, researchers believe.
Research from Distil Networks shows that bad bots represented more than eight percent of mobile web traffic in 2014.

FEATURES, INSIGHTS // Virus & Malware

rss icon

Zeus 2.1 now boasts features that help it avoid analysis and hostile takeover from law enforcement, researchers, or competing cybercriminal organizations.
David Harley's picture
David Harley chimes in with some thoughts on the latest developments from the AMTSO and the Anti-Malware Industry.
David Harley's picture
The vulnerability in Windows Shell’s parsing of .LNK (shortcut) files presents some interesting and novel features in terms of its media lifecycle as well as its evolution from zero-day to patched vulnerability. For most of us, the vulnerability first came to light in the context of Win32/Stuxnet, malware that in itself presents some notable quirks.
David Harley's picture
The anti-malware industry sometimes sees more complicated problems than you might imagine, and they can’t all be fixed by tweaking detection algorithms or giving the marketing team a productivity bonus.
Mike Lennon's picture
Malvertising - Popular websites, blogs, and ad networks are fast becoming the preferred means of cybercriminals, identity thieves, and hackers to steal consumer information and distribute malicious content.
Markus Jakobsson's picture
Anti-virus products scan for malware in two ways. They look for sequences of bits that are found in programs that are known to be “evil” (but which are not commonly found in “good” programs)...