Security Experts:

Virus & Malware
long dotted


Cybercriminal leaks source code of the Android banking Trojan known as GM Bot, MazarBot, SlemBunk, Acecard, Bankosy and Slempo [Read More]
AlienVault analyzes the OS X version of OceanLotus, a Trojan used in attacks against government, research and other organizations in China [Read More]
The developers of the Neutrino exploit kit have added a passive OS fingerprinting feature to reduce exposure to analysis attempts [Read More]
New Linux spyware “Ekoms” is capable of capturing screenshots and includes an inactive feature for recording audio [Read More]
Cryptear.B, a piece of ransomware based on the open source “educational” malware Hidden Tear, has been cracked by the author of Hidden Tear [Read More]
A piece of ransomware whose source code was released last year for educational purposes has been abused by cybercriminals [Read More]
An information-stealing Trojan dubbed Spymel uses compromised digital certificates to evade detection [Read More]
The number of Mac OS X systems infected with malware during the first nine months of 2015 is seven times higher than in all of 2014, Symantec reports. [Read More]
VirusTotal now allows users to check the behavior of Mac OS X files by running them in a sandbox. [Read More]
Version 4.0 of the CryptoWall ransomware has been released. Threat now encrypts file names, tells users it wants to make the Internet safer. [Read More]

FEATURES, INSIGHTS // Virus & Malware

rss icon

Zeus 2.1 now boasts features that help it avoid analysis and hostile takeover from law enforcement, researchers, or competing cybercriminal organizations.
David Harley's picture
David Harley chimes in with some thoughts on the latest developments from the AMTSO and the Anti-Malware Industry.
David Harley's picture
The vulnerability in Windows Shell’s parsing of .LNK (shortcut) files presents some interesting and novel features in terms of its media lifecycle as well as its evolution from zero-day to patched vulnerability. For most of us, the vulnerability first came to light in the context of Win32/Stuxnet, malware that in itself presents some notable quirks.
David Harley's picture
The anti-malware industry sometimes sees more complicated problems than you might imagine, and they can’t all be fixed by tweaking detection algorithms or giving the marketing team a productivity bonus.
Mike Lennon's picture
Malvertising - Popular websites, blogs, and ad networks are fast becoming the preferred means of cybercriminals, identity thieves, and hackers to steal consumer information and distribute malicious content.
Markus Jakobsson's picture
Anti-virus products scan for malware in two ways. They look for sequences of bits that are found in programs that are known to be “evil” (but which are not commonly found in “good” programs)...