Email
Password
Remember meForgot password?
    Log in with Twitter

Malware News

'Relieve Stress Paint' malware has hit Facebook accounts

In the last few days, criminals have compromised tens of thousands of Facebook accounts using a what at first glance appears to be a paint program for relieving stress.

Google claims Android security 'leads the industry'

Google has published its fourth Android Security Review in which it details its progress in protecting ecosystem. The company is trying to address the perception that Android is less secure than iOS, claiming the two platforms now have security parity.

Prilex malware clones chip-and-pin payment cards

Cybercriminals have developed an effective way to clone chip-and-pin cards, according to research from Kaspersky Lab. The Prilex campaign has been active for over three years and is designed to subvert the latest protections introduced by card companies.

Slingshot malware campaign hid inside routers for six years

Security researchers have discovered a "highly sophisticated" malware which has been targeting Wi-Fi routers for over six years. It's thought Slingshot is the product of a state-sponsored cyberespionage campaign.

Cyberattacks using Microsoft PowerShell soar by over 400%

Microsoft's PowerShell scripting engine is becoming the target of choice for attackers looking to sneak exploits onto Windows systems. Research conducted by McAfee found the use of "fileless" hacking, using scripts instead of programs, is rapidly growing.

'Null character' bug lets attackers bypass Windows 10 antimalware

Attackers could slip malware past Windows 10's built-in detection systems by prepending null characters to files. A security researcher discovered that Windows' Anti-Malware Scan Interface ignores everything after it encounters an empty character.

'Chaos' backdoor lets attackers gain control of Linux servers

A backdoor that exploits raw Linux sockets is giving attackers control of servers, security researchers have warned. They found malware is infecting systems by guessing passwords used to protect remote control systems. It works by monitoring socket data.

Crypto-mining botnet spreads to thousands of Android phones

An extensive botnet of Android devices has rapidly grown since coming to life this week. The ADB.Miner attack is infecting phones and using them to mine cryptocurrency coins. It's the latest example of a new class of crypto-mining cyberattack.

Apple and Cisco partner to make cyber insurance less costly

Apple and Cisco have partnered with insurance companies to offer a discounted cyber insurance service. Businesses that source their hardware from Apple and Cisco will be able to claim a reduction on insurance policies sold by Allianz SE.

AI helped remove over 700,000 malicious Android apps in 2017

Google removed over 700,000 Android apps last year for violating its policies. It said new machine learning techniques helped it achieve the 70% increase in removals over 2016. The company claimed 99% of apps were removed before anyone installed them.

Your phone's gyroscope could let hackers guess your PIN

Security researchers have documented a way to unlock a target's phone using readings from "zero-permission" sensors. Apps can access sensors such as the accelerometer and gyroscope without special permissions. The readings can be used to deduce your PIN.

WordPress plugin used by 300,000 websites hides a secret backdoor

A popular website plugin used by over 300,000 publishers contains a backdoor that could be used to compromise sites. The plugin recently changed hands, allowing the attackers to purchase a widely-used plugin that could be silently updated to spy on users.

IT leaders turn to AI to defend against AI-powered cyberattacks

Over 90% of cybersecurity leaders are concerned hackers will use AI to attack their company, according to a new report. Faced with increasingly sophisticated threats, businesses are looking towards defences which use AI to proactively respond to attacks.

HP admits to installing keylogger on hundreds of laptops

HP has admitted to installing a keylogger on hundreds of its laptops. Some of the company's most popular models are among those affected. The code was discovered inside HP's keyboard driver software by a security researcher investigating laptop keyboards.

Botnet of 100,000 routers could unleash cyberattack at any moment

A botnet of 100,000 home broadband routers is lying dormant and could be activated at any time, according to a security researcher. A new strain of the virulent IoT malware Mirai is being used to amass devices, perhaps in preparation for a major attack.

Nokia: Android smartphones biggest malware target in 2017

Android smartphones accounted for the majority of malware attacks over the past year, behind devices running Windows. The figures come from Nokia's Threat Intelligence Lab which warned more needs to be done to keep mobile users secure.

Antivirus software could help malware infect your PC

An antivirus software exploit could allow malware to escape quarantine and infect your system. A vulnerability found in several antivirus solutions gives an attacker a way to bypass usual mechanisms and gain full control of sensitive filesystem areas.

Op-Ed: MIT — Rethinking the realities of Augmented Reality

Sydney - Between the teeming hordes of hype merchants and the very meagre actual products, augmented reality is taking some baby thinking steps into practical things. MIT is looking at making AR safe for users.

Equifax website has been hacked again with fake Flash update

Equifax, the credit rating reporting agency that exposed personal data of nearly 150 million people, (and recently was awarded a contract by the IRS to confirm taxpayer's identities), appears to have been hacked — again.

Rise in websites using your CPU to mine cryptocurrency

More websites are including cryptocurrency miners that use your device's CPU to generate digital coins. After a miner was found on The Pirate Bay last month, more torrent sites have added scripts. Hackers are also adding miners to websites they hijack.

CCleaner malware might have been designed to steal trade secrets

The malware found bundled with popular computer maintenance software CCleaner was designed to compromise machines at some of the world's biggest tech companies. The discovery suggests the attack was more significant than first thought.

Small businesses suffer as ransomware epidemic grows

Small businesses are suffering from a ransomware epidemic. Firms have paid out a total of over $300 million in the past year, leaving them unable to make investments to develop their business. Recovering from the data loss can be an even greater struggle.

8 billion Bluetooth devices at risk of attack

Security researchers have discovered a flaw in Bluetooth that leaves almost every Bluetooth-enabled device vulnerable. It gives the attacker the ability to run malicious code. It's an example of what could go wrong with the Internet of Things.

Security-minded web browser Cocoon goes free for all

A free web browser is aiming to offer privacy-minded Internet users a safer way to navigate online. Cocoon uses cloud technology to proactively protect against hacks, ransomware and malicious sites. It also comes with encryption and an IP address shield.

Google pulls 500 Android apps over spyware backdoor fears

Google has removed over 500 Android apps from Google Play after security researchers discovered they could be used to download spyware. All the apps used an advertising network that contained code capable of stealing data from users.

Shipping industry at risk of cyberattacks by hackers and pirates

Hackers are increasingly targeting shipping firms to extract business information, attempt audacious frauds and steal goods from vessels. Members of the security industry warned shipping firms are often unaware of the dangers.

Microsoft sees cyberattacks as part of the 'fabric of society'

Microsoft has warned that artificial intelligence could "reset" cybercrime and the techniques used to combat it. AI is being used to tackle emerging threats but is also powering a new generation of malware created by elite attackers.

Cybersecurity is a $81.7 billion market — startups raking it in

Last year, investors put $3.5 billion into cybersecurity companies via more than 400 deals, according to CB Insights. And those numbers may well go up this year — the first quarter of 2017 set a five-year record for deals in the private security space.

U.S. nuclear power plants have been hacked, reports DHS

Washington D.c. - Russia's meddling in the 2016 U.S. presidential election is small potatoes compared to what the FBI and Department of Homeland Security (DHS) revealed Thursday night. Allegedly, Russian hackers have been targeting our nuclear power plants.

Windows XP updated to defend against 'nation-state' cyberattacks

Microsoft has taken the highly unusual step of releasing a new set of Windows security updates for unsupported operating system versions. The company said the patches come in the wake of WannaCrypt and provide protection against "nation-state actors."
  1 2 3 4 5 6 ... 7 Next»

Set up a news alert for

Malware


Malware Image

One of the fake malware recovery sites
One of the fake malware recovery sites
Symantec
The known reach of the Slingshot malware
The known reach of the Slingshot malware
Kaspersky Labs
Infected USB sticks delivered to mailboxes in Melbourne
Infected USB sticks delivered to mailboxes in Melbourne
Victoria Police Force
Torrent client uTorrent has been found to try to install the resource-hogging Bitcoin miner Epic Sca...
Torrent client uTorrent has been found to try to install the resource-hogging Bitcoin miner Epic Scale along with itself
How-To Geek
Gooligan malware
Gooligan malware
Check Point Security Technologies
Fake app reviews created by the Gooligan malware
Fake app reviews created by the Gooligan malware
Check Point Security Technologies
Don t be fooled. There is NO such compulsory update from Yahoo! or anyone else. Give InboxAce a miss...
Don't be fooled. There is NO such compulsory update from Yahoo! or anyone else. Give InboxAce a miss.
 Missing fonts  Chrome malware
"Missing fonts" Chrome malware
Mahmoud Al-Qudsi
Typical invoice email sent by Necurs botnet.
Typical invoice email sent by Necurs botnet.
Symantec
Mamba ransomware infects the MBR to display a custom decryption prompt before Windows starts
Mamba ransomware infects the MBR to display a custom decryption prompt before Windows starts
Renato Marinho
The malware authors manipulated search results
The malware authors manipulated search results
Symantec
Fake Windows 10 activation ransomware prompt
Fake Windows 10 activation ransomware prompt
Symantec
Digital Signature of CCleaner 5.33
Digital Signature of CCleaner 5.33
Cisco Talos
InstaAgent  an Instagram client that stole the passwords of hundreds of thousands of users
InstaAgent, an Instagram client that stole the passwords of hundreds of thousands of users
David-LR (@PeppersoftDev)
 Missing fonts  Chrome malware
"Missing fonts" Chrome malware
Mahmoud Al-Qudsi
Qualcomm s Smart Protect technology in its Snapdragon 820 processor will provide malware protection ...
Qualcomm's Smart Protect technology in its Snapdragon 820 processor will provide malware protection directly from the chip [YouTube still]
Qualcomm
TeslaCrypt encrypts game files on infected systems  demanding a ransom for their release
TeslaCrypt encrypts game files on infected systems, demanding a ransom for their release
Bromium Labs
Babylon is another scam search engine. Don t click the link  don t click anything  close the page an...
Babylon is another scam search engine. Don't click the link, don't click anything, close the page and get rid of it.
InstaAgent  an Instagram client that stole the passwords of hundreds of thousands of users
InstaAgent, an Instagram client that stole the passwords of hundreds of thousands of users
David-LR (@PeppersoftDev)
Untitled
Google