Security Experts:

Virus & Malware
long dotted


The official website of the Transmission BitTorrent app was once again used to deliver OS X malware [Read More]
New and improved version of the Vawtrak banking Trojan released. Latest version includes SSL pinning, DGA [Read More]
A new Linux Trojan developed in Go has been used by cybercriminals for cryptocurrency mining [Read More]
Researchers release decryption tools for Bart and PowerWare file-encrypting ransomware [Read More]
Researchers have uncovered links between various malware families known to be used by different Chinese APT actors [Read More]
Malware and adware use new technique to hide the DNS changes made on an infected system [Read More]
A large number of wireless networking devices from Ubiquiti have been infected by a worm that spreads via an old vulnerability [Read More]
Researchers have identified several new domain generation algorithm (DGA) variants used by malware and exploit kits [Read More]
In a legal brief, Mozilla warns that “the security of millions of individuals using Mozilla’s Firefox Internet browser could be put at risk by a premature disclosure of the vulnerability. [Read More]
Malware actors are exploiting the Flash Player vulnerability, which affects machines running Windows, Mac OS X, Linux and Chrome OS. [Read More]

FEATURES, INSIGHTS // Virus & Malware

rss icon

Zeus 2.1 now boasts features that help it avoid analysis and hostile takeover from law enforcement, researchers, or competing cybercriminal organizations.
David Harley's picture
David Harley chimes in with some thoughts on the latest developments from the AMTSO and the Anti-Malware Industry.
David Harley's picture
The vulnerability in Windows Shell’s parsing of .LNK (shortcut) files presents some interesting and novel features in terms of its media lifecycle as well as its evolution from zero-day to patched vulnerability. For most of us, the vulnerability first came to light in the context of Win32/Stuxnet, malware that in itself presents some notable quirks.
David Harley's picture
The anti-malware industry sometimes sees more complicated problems than you might imagine, and they can’t all be fixed by tweaking detection algorithms or giving the marketing team a productivity bonus.
Mike Lennon's picture
Malvertising - Popular websites, blogs, and ad networks are fast becoming the preferred means of cybercriminals, identity thieves, and hackers to steal consumer information and distribute malicious content.
Markus Jakobsson's picture
Anti-virus products scan for malware in two ways. They look for sequences of bits that are found in programs that are known to be “evil” (but which are not commonly found in “good” programs)...