Security Experts:

Virus & Malware
long dotted


A new report highlights the challenge of patch management, and how antivirus is falling short
The framework is at the center of Facebook's efforts to protect its network and understand the threat landscape.
More details have emerged about a Google Android vulnerability that could be exploited to trap devices in a reboot loop.
ATM hackers can communicate with compromised machines using mobile phones, giving them a new level of stealth.
Barracuda has created a web portal that enables users to get visual and textual information on compromised sites.
Researchers with F-Secure say a variant of Gameover is targeting bitcoin users
Infected Linux and UNIX servers are being used to redirect as many as 500,000 web surfers daily, according to researchers
POS malware is on the rise, and retailers need to secure their systems, researchers say
Kaspersky Lab says there has been an uptick in recent months of malware authors attempting to use TOR to hide their infrastructure, as well as a growth in criminal marketplaces.
Two Bitcoin exchanges were hit recently by hackers, causing one to shutdown.

FEATURES, INSIGHTS // Virus & Malware

rss icon

Aviv Raff's picture
Just as offices need to detect break-ins to keep criminals from committing industrial espionage, enterprises need to put more focus on detecting APTs and other advanced threats to keep adversaries from their network.
Michael Callahan's picture
While obscuring website code, server architecture, and security mechanisms doesn’t provide bullet-proof security on its own, it is actually pretty effective.
Wade Williamson's picture
Even with the basics covered, we also have to be on the lookout for unknown threats and anomalies in our networks that can be an indicator of compromise.
Jon-Louis Heimerl's picture
Was the Mayan Apocalypse was a myth? Since I am a security geek, I just happen to talk about security a lot. What are some security myths I have heard in my conversations with some very bright people?
Andrew Jaquith's picture
As with most stories Mac-related, the malware-is-finally-coming story attracted a lot of press. But the desktop Mac OS might not be attractive to attackers as you might think.
Ram Mohan's picture
We still don't know who created Conficker or what that person’s motivations were. What we do know: Conficker could have proved much more damaging than it ultimately did, but the threat has not entirely disappeared.
Mike Lennon's picture
Enjoy this selection of top picks for 2010, listed in no particular order. Happy New Year!
Zeus 2.1 now boasts features that help it avoid analysis and hostile takeover from law enforcement, researchers, or competing cybercriminal organizations.
David Harley's picture
David Harley chimes in with some thoughts on the latest developments from the AMTSO and the Anti-Malware Industry.
David Harley's picture
The vulnerability in Windows Shell’s parsing of .LNK (shortcut) files presents some interesting and novel features in terms of its media lifecycle as well as its evolution from zero-day to patched vulnerability. For most of us, the vulnerability first came to light in the context of Win32/Stuxnet, malware that in itself presents some notable quirks.