Security Experts:

Virus & Malware
long dotted


The number of IoT devices ensnared by Mirai botnets has increased considerably following the leak of the malware’s source code [Read More]
An exploit for a zero-day vulnerability affecting an ecommerce plugin for WordPress has been added by cybercriminals to their toolkit [Read More]
The Dyre developers that were not arrested by Russian authorities are apparently working on a new banking Trojan dubbed TrickBot [Read More]
Hackers have been using web-based form-grabbers to steal payment card data from ecommerce sites. Over 100 victims identified [Read More]
OS X malware can silently record audio and video from infected Macs by piggybacking on sessions initiated by legitimate applications such as FaceTime and Skype [Read More]
Hacker releases source code of Mirai, the IoT malware used to launch massive DDoS attacks against Brian Krebs, OVH and others [Read More]
Cybercriminals using Tofsee malware have recently switched the distribution method from exploit kits to spam emails [Read More]
Cisco researchers crack DGA used by GozNym banking Trojan and start sinkholing botnets. 23,000 infections observed in first 24 hours [Read More]
A Windows Trojan named DualToy uses USB connections to load risky and malicious apps onto Android and iOS devices [Read More]
A malware that uses infected computers to mine Monero cryptocurrency leverages NAS devices for distribution [Read More]

FEATURES, INSIGHTS // Virus & Malware

rss icon

Zeus 2.1 now boasts features that help it avoid analysis and hostile takeover from law enforcement, researchers, or competing cybercriminal organizations.
David Harley's picture
David Harley chimes in with some thoughts on the latest developments from the AMTSO and the Anti-Malware Industry.
David Harley's picture
The vulnerability in Windows Shell’s parsing of .LNK (shortcut) files presents some interesting and novel features in terms of its media lifecycle as well as its evolution from zero-day to patched vulnerability. For most of us, the vulnerability first came to light in the context of Win32/Stuxnet, malware that in itself presents some notable quirks.
David Harley's picture
The anti-malware industry sometimes sees more complicated problems than you might imagine, and they can’t all be fixed by tweaking detection algorithms or giving the marketing team a productivity bonus.
Mike Lennon's picture
Malvertising - Popular websites, blogs, and ad networks are fast becoming the preferred means of cybercriminals, identity thieves, and hackers to steal consumer information and distribute malicious content.
Markus Jakobsson's picture
Anti-virus products scan for malware in two ways. They look for sequences of bits that are found in programs that are known to be “evil” (but which are not commonly found in “good” programs)...