Email
Password
Remember meForgot password?
    Log in with Twitter

Malware News

CompuCom hit with $20 million in losses after ransomware attack Special

U.S. based managed service provider CompuCom is expecting losses of over $20 million following this month's DarkSide ransomware attack that took down most of its systems. The implications of this are revealed.

Ransomware: More of it and the payment demands are getting bigger Special

Ransomware attacks initially begin with a minor breach of a corporate system. This then grows as the cybercriminals methodically expand their control of a firm's technology. This is happening more often and with greater impact.

New malware seeks to strike at the core of Apple Special

Apple devices have often been seen as safer that other computers. This is no longer the case as a new form of malware has been developed to specifically target Apple devices.

Subway customers receive 'malware' emails Special

It's been reported that Subway customers in the UK are receiving scam emails as part of a phishing attack. The emails also use the victims' names, and appear to come from the chain's Subcard loyalty scheme.

CISA advisory examines LokiBot malware threat Special

The U.S. government's cybersecurity agency issued a security advisory has issued a warning to federal agencies and the private sector about a notable increase in the use of LokiBot malware by malicious cyber actors.

Cybersecurity: FBI calls out Advanced Persistent Threat 39 Special

The U.S. FBI has released a new cybersecurity advisory to academic, public, and private sector partners across the country about previously undisclosed malware attributed to Iranian nation state actors publicly known as Advanced Persistent Threat 39.

The Android vulnerability affecting 1 billion devices Special

Over one billion Android devices have been left vulnerable to hacking since Google no longer offer security updates on older operating systems. Will La Sala explains the implications to Digital Journal.

Haken malware discovered on Google Play Store Special

News reports indicate that a new malware strain, dubbed Haken, has been discovered within several apps on the Google Play store. Sam Bakken explains that this is just the latest issue to hit Play.

Buisnesses now face maturing cybercrime risks

Over the next decade, businesses will face maturing cybercrime and renewed nation-state cyberattacks. Both of these threats are key areas for which businesses need to be aware, as well as for governments to take action.

Landry’s Inc hacked despite end-to-end encryption Special

Landry’s Inc., a restaurant and hospitality corporation that owns popular eateries such as McCormick and Schmick’s, Rainforest Cafe and Del Frisco’s, was infected by malware that infected its order-entry systems to steal customer payment card inform

Q&A: Zombie malware is the next big cybersecurity risk Special

There are various forms of malware attacks and the latest to be concerned about is so-called ‘zombie malware’, a type of malware that transforms a computer into a slave so that attacks can be performed remotely.

Reviewing the impact of the VPNFilter malware attack

A novel VPNFilter malware has affected 500,000 networking devices globally. Marina Kidron, Director of Threat Intelligence in the Skybox Research Lab looks at what is know so far.

'Relieve Stress Paint' malware has hit Facebook accounts

In the last few days, criminals have compromised tens of thousands of Facebook accounts using a what at first glance appears to be a paint program for relieving stress.

Google claims Android security 'leads the industry'

Google has published its fourth Android Security Review in which it details its progress in protecting ecosystem. The company is trying to address the perception that Android is less secure than iOS, claiming the two platforms now have security parity.

Prilex malware clones chip-and-pin payment cards

Cybercriminals have developed an effective way to clone chip-and-pin cards, according to research from Kaspersky Lab. The Prilex campaign has been active for over three years and is designed to subvert the latest protections introduced by card companies.

Slingshot malware campaign hid inside routers for six years

Security researchers have discovered a "highly sophisticated" malware which has been targeting Wi-Fi routers for over six years. It's thought Slingshot is the product of a state-sponsored cyberespionage campaign.

Cyberattacks using Microsoft PowerShell soar by over 400%

Microsoft's PowerShell scripting engine is becoming the target of choice for attackers looking to sneak exploits onto Windows systems. Research conducted by McAfee found the use of "fileless" hacking, using scripts instead of programs, is rapidly growing.

'Null character' bug lets attackers bypass Windows 10 antimalware

Attackers could slip malware past Windows 10's built-in detection systems by prepending null characters to files. A security researcher discovered that Windows' Anti-Malware Scan Interface ignores everything after it encounters an empty character.

'Chaos' backdoor lets attackers gain control of Linux servers

A backdoor that exploits raw Linux sockets is giving attackers control of servers, security researchers have warned. They found malware is infecting systems by guessing passwords used to protect remote control systems. It works by monitoring socket data.

Crypto-mining botnet spreads to thousands of Android phones

An extensive botnet of Android devices has rapidly grown since coming to life this week. The ADB.Miner attack is infecting phones and using them to mine cryptocurrency coins. It's the latest example of a new class of crypto-mining cyberattack.

Apple and Cisco partner to make cyber insurance less costly

Apple and Cisco have partnered with insurance companies to offer a discounted cyber insurance service. Businesses that source their hardware from Apple and Cisco will be able to claim a reduction on insurance policies sold by Allianz SE.

AI helped remove over 700,000 malicious Android apps in 2017

Google removed over 700,000 Android apps last year for violating its policies. It said new machine learning techniques helped it achieve the 70% increase in removals over 2016. The company claimed 99% of apps were removed before anyone installed them.

Your phone's gyroscope could let hackers guess your PIN

Security researchers have documented a way to unlock a target's phone using readings from "zero-permission" sensors. Apps can access sensors such as the accelerometer and gyroscope without special permissions. The readings can be used to deduce your PIN.

WordPress plugin used by 300,000 websites hides a secret backdoor

A popular website plugin used by over 300,000 publishers contains a backdoor that could be used to compromise sites. The plugin recently changed hands, allowing the attackers to purchase a widely-used plugin that could be silently updated to spy on users.

IT leaders turn to AI to defend against AI-powered cyberattacks

Over 90% of cybersecurity leaders are concerned hackers will use AI to attack their company, according to a new report. Faced with increasingly sophisticated threats, businesses are looking towards defences which use AI to proactively respond to attacks.

HP admits to installing keylogger on hundreds of laptops

HP has admitted to installing a keylogger on hundreds of its laptops. Some of the company's most popular models are among those affected. The code was discovered inside HP's keyboard driver software by a security researcher investigating laptop keyboards.

Botnet of 100,000 routers could unleash cyberattack at any moment

A botnet of 100,000 home broadband routers is lying dormant and could be activated at any time, according to a security researcher. A new strain of the virulent IoT malware Mirai is being used to amass devices, perhaps in preparation for a major attack.

Nokia: Android smartphones biggest malware target in 2017

Android smartphones accounted for the majority of malware attacks over the past year, behind devices running Windows. The figures come from Nokia's Threat Intelligence Lab which warned more needs to be done to keep mobile users secure.

Antivirus software could help malware infect your PC

An antivirus software exploit could allow malware to escape quarantine and infect your system. A vulnerability found in several antivirus solutions gives an attacker a way to bypass usual mechanisms and gain full control of sensitive filesystem areas.

Op-Ed: MIT — Rethinking the realities of Augmented Reality

Sydney - Between the teeming hordes of hype merchants and the very meagre actual products, augmented reality is taking some baby thinking steps into practical things. MIT is looking at making AR safe for users.
  1 2 3 4 5 6 ... 7 Next»

Set up a news alert for

Malware


Malware Image

InstaAgent  an Instagram client that stole the passwords of hundreds of thousands of users
InstaAgent, an Instagram client that stole the passwords of hundreds of thousands of users
David-LR (@PeppersoftDev)
Digital Signature of CCleaner 5.33
Digital Signature of CCleaner 5.33
Cisco Talos
Gooligan malware
Gooligan malware
Check Point Security Technologies
The known reach of the Slingshot malware
The known reach of the Slingshot malware
Kaspersky Labs
 Missing fonts  Chrome malware
"Missing fonts" Chrome malware
Mahmoud Al-Qudsi
Torrent client uTorrent has been found to try to install the resource-hogging Bitcoin miner Epic Sca...
Torrent client uTorrent has been found to try to install the resource-hogging Bitcoin miner Epic Scale along with itself
How-To Geek
TeslaCrypt encrypts game files on infected systems  demanding a ransom for their release
TeslaCrypt encrypts game files on infected systems, demanding a ransom for their release
Bromium Labs
Qualcomm s Smart Protect technology in its Snapdragon 820 processor will provide malware protection ...
Qualcomm's Smart Protect technology in its Snapdragon 820 processor will provide malware protection directly from the chip [YouTube still]
Qualcomm
Untitled
Google
Mamba ransomware infects the MBR to display a custom decryption prompt before Windows starts
Mamba ransomware infects the MBR to display a custom decryption prompt before Windows starts
Renato Marinho
Gooligan malware
Gooligan malware
Check Point Security Technologies
Do not open this program.
Do not open this program.
Radware
Don t be fooled. There is NO such compulsory update from Yahoo! or anyone else. Give InboxAce a miss...
Don't be fooled. There is NO such compulsory update from Yahoo! or anyone else. Give InboxAce a miss.
The malware bundled with CCleaner targeted  at least  20 of the world s largest tech firms
The malware bundled with CCleaner targeted "at least" 20 of the world's largest tech firms
Pexels / Tookapic
Fake Windows 10 activation ransomware prompt
Fake Windows 10 activation ransomware prompt
Symantec
No More Ransom helps people recover from ransomware attacks
No More Ransom helps people recover from ransomware attacks
No More Ransom
InstaAgent  an Instagram client that stole the passwords of hundreds of thousands of users
InstaAgent, an Instagram client that stole the passwords of hundreds of thousands of users
David-LR (@PeppersoftDev)
Gooligan malware
Gooligan malware
Check Point Security Technologies
Fake Windows 10 activation ransomware prompt
Fake Windows 10 activation ransomware prompt
Symantec
The Rombertik malware wipes hard drives when detected
The Rombertik malware wipes hard drives when detected
Cisco

Latest News
Top News