Security Experts:

Virus & Malware
long dotted

NEWS & INDUSTRY UPDATES

Bitdefender is warning the employees and IT administrators of small and medium-sized businesses (SMBs) to be on the lookout for fake emails designed to distribute information-stealing malware.
A security researcher at Cisco says the company has now isolated nearly 6,500 domains sharing the same infrastructure.
The malware steals Apple ID and password information and makes purchases from Apple's official App Store.
In a follow-up to a report earlier this year on the use of visual basic code in malicious documents, researchers at Sophos say the trend is continuing to gain momentum.
The Tinybanker/Tinba Trojan has expanded its target list to attack banks worldwide, according to Avast.
According to Trend Micro, roughly 74 percent of PoS malware detections between April and June have been in the U.S.
A phishing campaign targeting Apple IDs was spotted last week on the heels of news that Apple iCloud accounts belonging to several celebrities had been compromised.
Two well known independent antivirus testing labs have published the results of tests performed on security products designed for devices running Mac OS X operating systems.
AVG Technologies will pay $140 million initially, plus an additional $80 million in cash considerations during the next two years based on the achievement of certain performance-related criteria.
Researchers at FireEye take a look at the Syrian Malware Team, a possible offshoot of the Syrian Electronic Army.

FEATURES, INSIGHTS // Virus & Malware

rss icon

David Harley's picture
David Harley chimes in with some thoughts on the latest developments from the AMTSO and the Anti-Malware Industry.
David Harley's picture
The vulnerability in Windows Shell’s parsing of .LNK (shortcut) files presents some interesting and novel features in terms of its media lifecycle as well as its evolution from zero-day to patched vulnerability. For most of us, the vulnerability first came to light in the context of Win32/Stuxnet, malware that in itself presents some notable quirks.
David Harley's picture
The anti-malware industry sometimes sees more complicated problems than you might imagine, and they can’t all be fixed by tweaking detection algorithms or giving the marketing team a productivity bonus.
Mike Lennon's picture
Malvertising - Popular websites, blogs, and ad networks are fast becoming the preferred means of cybercriminals, identity thieves, and hackers to steal consumer information and distribute malicious content.
Markus Jakobsson's picture
Anti-virus products scan for malware in two ways. They look for sequences of bits that are found in programs that are known to be “evil” (but which are not commonly found in “good” programs)...