Security Experts:

Virus & Malware
long dotted


Victims of the Locker ransomware can recover their files for free. The decryption keys have been made available by someone claiming to be the malware's author.
Amateurish cybercriminal from Nigeria triggered Rombertik's MBR overwrite mechanism, says ThreatConnect.
The worm is being used to commit fraud on social networks such as Facebook and Twitter, researchers believe.
Research from Distil Networks shows that bad bots represented more than eight percent of mobile web traffic in 2014.
Researchers at FireEye have spotted a spam campaign that is also distributing a new family of point-of-sale malware.
New TLS vulnerability dubbed Logjam exposes many websites and mail servers. Attackers can exploit the bug to downgrade connections and eavesdrop on communications.
Trojanized version of the PuTTY SSH client used to steal sensitive information. The attackers rely on compromised websites to lure victims to the malicious variant.
Oracle issued updates to address the VENOM vulnerability.
The Rombertik malware destroys the MBR to prevent unauthorized use by cybercriminals. The feature is not aimed at security researchers, says Symantec.
Trend Micro unmasks a spate of ongoing attacks targeting government, military and industry officials in Taiwan and the Philippines.

FEATURES, INSIGHTS // Virus & Malware

rss icon

Zeus 2.1 now boasts features that help it avoid analysis and hostile takeover from law enforcement, researchers, or competing cybercriminal organizations.
David Harley's picture
David Harley chimes in with some thoughts on the latest developments from the AMTSO and the Anti-Malware Industry.
David Harley's picture
The vulnerability in Windows Shell’s parsing of .LNK (shortcut) files presents some interesting and novel features in terms of its media lifecycle as well as its evolution from zero-day to patched vulnerability. For most of us, the vulnerability first came to light in the context of Win32/Stuxnet, malware that in itself presents some notable quirks.
David Harley's picture
The anti-malware industry sometimes sees more complicated problems than you might imagine, and they can’t all be fixed by tweaking detection algorithms or giving the marketing team a productivity bonus.
Mike Lennon's picture
Malvertising - Popular websites, blogs, and ad networks are fast becoming the preferred means of cybercriminals, identity thieves, and hackers to steal consumer information and distribute malicious content.
Markus Jakobsson's picture
Anti-virus products scan for malware in two ways. They look for sequences of bits that are found in programs that are known to be “evil” (but which are not commonly found in “good” programs)...