Security Experts:

Virus & Malware
long dotted


Researchers at Microsoft are reporting a spike in the use of macros to spread malware via spam and social engineering.
Trend Micro researchers have come across a 64-bit version of Havex, a remote access tool (RAT) that has been used in cyber espionage campaigns aimed at industrial control systems (ICS)
A new report from Sophos dives deep into the Vawtrak malware, which has been linked to attacks on bank customers around the globe.
Researchers say the group focused on internal payment gateways and internal banking systems.
The new variant has been dubbed 'Spark' by researchers at Trustwave.
Akamai Technologies issued a report about attackers using the Xsser Trojan to target Android and iOS devices.
Researchers have uncovered a worm that's designed to plant backdoors on QNAP network-attached storage (NAS) devices. The malware is distributed through the exploitation of the GNU Bash vulnerability known as ShellShock.
Mobile security firm Lookout says that malware known as DeathRing is being detected on devices throughout Asia and Africa.
Facebook says the partnership will help protect users from malware.
The United States was home for 30 percent of the PoS malware infections identified by Trend Micro in the third quarter.

FEATURES, INSIGHTS // Virus & Malware

rss icon

Zeus 2.1 now boasts features that help it avoid analysis and hostile takeover from law enforcement, researchers, or competing cybercriminal organizations.
David Harley's picture
David Harley chimes in with some thoughts on the latest developments from the AMTSO and the Anti-Malware Industry.
David Harley's picture
The vulnerability in Windows Shell’s parsing of .LNK (shortcut) files presents some interesting and novel features in terms of its media lifecycle as well as its evolution from zero-day to patched vulnerability. For most of us, the vulnerability first came to light in the context of Win32/Stuxnet, malware that in itself presents some notable quirks.
David Harley's picture
The anti-malware industry sometimes sees more complicated problems than you might imagine, and they can’t all be fixed by tweaking detection algorithms or giving the marketing team a productivity bonus.
Mike Lennon's picture
Malvertising - Popular websites, blogs, and ad networks are fast becoming the preferred means of cybercriminals, identity thieves, and hackers to steal consumer information and distribute malicious content.
Markus Jakobsson's picture
Anti-virus products scan for malware in two ways. They look for sequences of bits that are found in programs that are known to be “evil” (but which are not commonly found in “good” programs)...