Security Experts:

Virus & Malware
long dotted


Malicious macros hidden inside XML files have been used by cybercriminals to distribute the Dridex banking Trojan.
Researchers have analyzed Casper, a reconnaissance tool apparently developed by the same group that created Babar, the malware linked to French intelligence.
Researchers at Trend Micro have spotted a new point-of-sale malware threat targeting businesses around the world, including in the United States and Japan.
The Angler exploit kit has started using a technique called Domain Shadowing to ensure that operations are not disrupted by IP and domain blacklisting.
Hackers have modified an exploit for a use-after-free vulnerability in Internet Explorer and put it in the Angler exploit kit, according to researchers at FireEye.
The PlugX malware was spotted in an attack campaign in India hiding its malicious payload in Windows registry - a change that shows the ongoing development of the malware.
Intel Security's McAfee Labs found that 18 of the 25 most downloaded apps tested last year by CERT remain vulnerable to man-in-the-middle attacks.
Google Safe Browsing expanded in Chrome, search, and ads to protect users against unwanted software.
Security experts react to the Superfish incident: impact on Lenovo's reputation, risks, and recommendations for consumers and manufacturers.
Lenovo computers come with a piece of adware capable of launching man-in-the-middle attacks against HTTPS connections.

FEATURES, INSIGHTS // Virus & Malware

rss icon

Zeus 2.1 now boasts features that help it avoid analysis and hostile takeover from law enforcement, researchers, or competing cybercriminal organizations.
David Harley's picture
David Harley chimes in with some thoughts on the latest developments from the AMTSO and the Anti-Malware Industry.
David Harley's picture
The vulnerability in Windows Shell’s parsing of .LNK (shortcut) files presents some interesting and novel features in terms of its media lifecycle as well as its evolution from zero-day to patched vulnerability. For most of us, the vulnerability first came to light in the context of Win32/Stuxnet, malware that in itself presents some notable quirks.
David Harley's picture
The anti-malware industry sometimes sees more complicated problems than you might imagine, and they can’t all be fixed by tweaking detection algorithms or giving the marketing team a productivity bonus.
Mike Lennon's picture
Malvertising - Popular websites, blogs, and ad networks are fast becoming the preferred means of cybercriminals, identity thieves, and hackers to steal consumer information and distribute malicious content.
Markus Jakobsson's picture
Anti-virus products scan for malware in two ways. They look for sequences of bits that are found in programs that are known to be “evil” (but which are not commonly found in “good” programs)...