Security Experts:

Virus & Malware
long dotted


The total number of digital certificates used to sign malicious and shady software has increased considerably over the past years, Kaspersky shows
Symantec has discovered a link between a backdoor Trojan and the Skeleton Key malware used to bypass authentication on Active Directory systems.
Researchers at Dell SecureWorks noted a resurgence of the ZeroAccess botnet.
Researchers at Kaspersky Lab believe there is a connection between the Regin malware platform and a malware platform exposed in documents leaked by Edward Snowden.
NSA offered organizations a set of best practices for defending against malware attacks.
Malware developers have used the source code of the remote access tool (RAT) Njw0rm to create two new RATs, researchers at Trend Micro reported on Thursday.
Researchers at Kaspersky Lab disclosed information about two of the modules used by the notorious malware platform.
In mid-December, malware developers launched a new version of the notorious Carberp Trojan, a threat designed to steal sensitive information from infected devices.
Version 3.0 of the notorious file-encrypting ransomware CryptoWall has been spotted by researchers.
Researchers at Dell SecureWorks say the malware allows attackers to use a password of their choosing to authenticate as any user.

FEATURES, INSIGHTS // Virus & Malware

rss icon

Zeus 2.1 now boasts features that help it avoid analysis and hostile takeover from law enforcement, researchers, or competing cybercriminal organizations.
David Harley's picture
David Harley chimes in with some thoughts on the latest developments from the AMTSO and the Anti-Malware Industry.
David Harley's picture
The vulnerability in Windows Shell’s parsing of .LNK (shortcut) files presents some interesting and novel features in terms of its media lifecycle as well as its evolution from zero-day to patched vulnerability. For most of us, the vulnerability first came to light in the context of Win32/Stuxnet, malware that in itself presents some notable quirks.
David Harley's picture
The anti-malware industry sometimes sees more complicated problems than you might imagine, and they can’t all be fixed by tweaking detection algorithms or giving the marketing team a productivity bonus.
Mike Lennon's picture
Malvertising - Popular websites, blogs, and ad networks are fast becoming the preferred means of cybercriminals, identity thieves, and hackers to steal consumer information and distribute malicious content.
Markus Jakobsson's picture
Anti-virus products scan for malware in two ways. They look for sequences of bits that are found in programs that are known to be “evil” (but which are not commonly found in “good” programs)...