Security Experts:

Virus & Malware
long dotted

NEWS & INDUSTRY UPDATES

AT&T is offering a new cloud-based security solution designed to protect customers against malware and malicious websites while offering security policy control across enterprise, web, social and mobile networks.
A patch for the bug is available, but if left open attackers could get their hands on secret keys and other data. CVE-2014-0160
CryptoDefense may be raking in the loot, but a flaw may provide victims a way to escape without paying.
Researchers at Symantec go inside a remote access tool that is gaining popularity in the Middle East and has been linked to attacks on Syrian opposition forces
A new report highlights the challenge of patch management, and how antivirus is falling short
The framework is at the center of Facebook's efforts to protect its network and understand the threat landscape.
More details have emerged about a Google Android vulnerability that could be exploited to trap devices in a reboot loop.
ATM hackers can communicate with compromised machines using mobile phones, giving them a new level of stealth.
Barracuda has created a web portal that enables users to get visual and textual information on compromised sites.
Researchers with F-Secure say a variant of Gameover is targeting bitcoin users

FEATURES, INSIGHTS // Virus & Malware

rss icon

Aviv Raff's picture
Just as offices need to detect break-ins to keep criminals from committing industrial espionage, enterprises need to put more focus on detecting APTs and other advanced threats to keep adversaries from their network.
Michael Callahan's picture
While obscuring website code, server architecture, and security mechanisms doesn’t provide bullet-proof security on its own, it is actually pretty effective.
Wade Williamson's picture
Even with the basics covered, we also have to be on the lookout for unknown threats and anomalies in our networks that can be an indicator of compromise.
Jon-Louis Heimerl's picture
Was the Mayan Apocalypse was a myth? Since I am a security geek, I just happen to talk about security a lot. What are some security myths I have heard in my conversations with some very bright people?
Andrew Jaquith's picture
As with most stories Mac-related, the malware-is-finally-coming story attracted a lot of press. But the desktop Mac OS might not be attractive to attackers as you might think.
Ram Mohan's picture
We still don't know who created Conficker or what that person’s motivations were. What we do know: Conficker could have proved much more damaging than it ultimately did, but the threat has not entirely disappeared.
Mike Lennon's picture
Enjoy this selection of top picks for 2010, listed in no particular order. Happy New Year!
Zeus 2.1 now boasts features that help it avoid analysis and hostile takeover from law enforcement, researchers, or competing cybercriminal organizations.
David Harley's picture
David Harley chimes in with some thoughts on the latest developments from the AMTSO and the Anti-Malware Industry.
David Harley's picture
The vulnerability in Windows Shell’s parsing of .LNK (shortcut) files presents some interesting and novel features in terms of its media lifecycle as well as its evolution from zero-day to patched vulnerability. For most of us, the vulnerability first came to light in the context of Win32/Stuxnet, malware that in itself presents some notable quirks.