Security Experts:

Virus & Malware
long dotted


Trend Micro researchers say the Sandworm team identified last week may be targeting SCADA systems.
A security researcher has uncovered a new attack vector called "Reflected File Download" where a malicious file can be downloaded without actually being uploaded anywhere.
The malware, dubbed Tyupkin, has been spotted on more than 50 machines throughout Eastern Europe.
Outlier Security, a startup co-founded by former HBGary CEO Greg Hoglund emerged from stealth mode with a new approach on how enterprises can detect threats targeting their endpoints.
AT&T admitted an employee accessed customer personal information without information in August.
The iWorm malware is reportedly being spread through pirated software
A new piece of malware (Mac.BackDoor.iWorm) has infected thousands of Mac OS X devices and uses Reddit to get a list of command and control (C&C) servers.
Palo Alto Networks has launched a new endpoint security solution designed to prevent sophisticated cyber attacks.
The FBI has launched Malware Investigator, an unclassified automated malware analysis tool designed to provide users with detailed technical information on malware.
The amount of cryptomalware hitting users in Australia has increased dramatically since May, according to Symantec.

FEATURES, INSIGHTS // Virus & Malware

rss icon

David Harley's picture
David Harley chimes in with some thoughts on the latest developments from the AMTSO and the Anti-Malware Industry.
David Harley's picture
The vulnerability in Windows Shell’s parsing of .LNK (shortcut) files presents some interesting and novel features in terms of its media lifecycle as well as its evolution from zero-day to patched vulnerability. For most of us, the vulnerability first came to light in the context of Win32/Stuxnet, malware that in itself presents some notable quirks.
David Harley's picture
The anti-malware industry sometimes sees more complicated problems than you might imagine, and they can’t all be fixed by tweaking detection algorithms or giving the marketing team a productivity bonus.
Mike Lennon's picture
Malvertising - Popular websites, blogs, and ad networks are fast becoming the preferred means of cybercriminals, identity thieves, and hackers to steal consumer information and distribute malicious content.
Markus Jakobsson's picture
Anti-virus products scan for malware in two ways. They look for sequences of bits that are found in programs that are known to be “evil” (but which are not commonly found in “good” programs)...
view counter