Email
Password
Remember meForgot password?
    Log in with Twitter

Malware News

The Android vulnerability affecting 1 billion devices Special

Over one billion Android devices have been left vulnerable to hacking since Google no longer offer security updates on older operating systems. Will La Sala explains the implications to Digital Journal.

Haken malware discovered on Google Play Store Special

News reports indicate that a new malware strain, dubbed Haken, has been discovered within several apps on the Google Play store. Sam Bakken explains that this is just the latest issue to hit Play.

Buisnesses now face maturing cybercrime risks

Over the next decade, businesses will face maturing cybercrime and renewed nation-state cyberattacks. Both of these threats are key areas for which businesses need to be aware, as well as for governments to take action.

Landry’s Inc hacked despite end-to-end encryption Special

Landry’s Inc., a restaurant and hospitality corporation that owns popular eateries such as McCormick and Schmick’s, Rainforest Cafe and Del Frisco’s, was infected by malware that infected its order-entry systems to steal customer payment card inform

Q&A: Zombie malware is the next big cybersecurity risk Special

There are various forms of malware attacks and the latest to be concerned about is so-called ‘zombie malware’, a type of malware that transforms a computer into a slave so that attacks can be performed remotely.

Reviewing the impact of the VPNFilter malware attack

A novel VPNFilter malware has affected 500,000 networking devices globally. Marina Kidron, Director of Threat Intelligence in the Skybox Research Lab looks at what is know so far.

'Relieve Stress Paint' malware has hit Facebook accounts

In the last few days, criminals have compromised tens of thousands of Facebook accounts using a what at first glance appears to be a paint program for relieving stress.

Google claims Android security 'leads the industry'

Google has published its fourth Android Security Review in which it details its progress in protecting ecosystem. The company is trying to address the perception that Android is less secure than iOS, claiming the two platforms now have security parity.

Prilex malware clones chip-and-pin payment cards

Cybercriminals have developed an effective way to clone chip-and-pin cards, according to research from Kaspersky Lab. The Prilex campaign has been active for over three years and is designed to subvert the latest protections introduced by card companies.

Slingshot malware campaign hid inside routers for six years

Security researchers have discovered a "highly sophisticated" malware which has been targeting Wi-Fi routers for over six years. It's thought Slingshot is the product of a state-sponsored cyberespionage campaign.

Cyberattacks using Microsoft PowerShell soar by over 400%

Microsoft's PowerShell scripting engine is becoming the target of choice for attackers looking to sneak exploits onto Windows systems. Research conducted by McAfee found the use of "fileless" hacking, using scripts instead of programs, is rapidly growing.

'Null character' bug lets attackers bypass Windows 10 antimalware

Attackers could slip malware past Windows 10's built-in detection systems by prepending null characters to files. A security researcher discovered that Windows' Anti-Malware Scan Interface ignores everything after it encounters an empty character.

'Chaos' backdoor lets attackers gain control of Linux servers

A backdoor that exploits raw Linux sockets is giving attackers control of servers, security researchers have warned. They found malware is infecting systems by guessing passwords used to protect remote control systems. It works by monitoring socket data.

Crypto-mining botnet spreads to thousands of Android phones

An extensive botnet of Android devices has rapidly grown since coming to life this week. The ADB.Miner attack is infecting phones and using them to mine cryptocurrency coins. It's the latest example of a new class of crypto-mining cyberattack.

Apple and Cisco partner to make cyber insurance less costly

Apple and Cisco have partnered with insurance companies to offer a discounted cyber insurance service. Businesses that source their hardware from Apple and Cisco will be able to claim a reduction on insurance policies sold by Allianz SE.

AI helped remove over 700,000 malicious Android apps in 2017

Google removed over 700,000 Android apps last year for violating its policies. It said new machine learning techniques helped it achieve the 70% increase in removals over 2016. The company claimed 99% of apps were removed before anyone installed them.

Your phone's gyroscope could let hackers guess your PIN

Security researchers have documented a way to unlock a target's phone using readings from "zero-permission" sensors. Apps can access sensors such as the accelerometer and gyroscope without special permissions. The readings can be used to deduce your PIN.

WordPress plugin used by 300,000 websites hides a secret backdoor

A popular website plugin used by over 300,000 publishers contains a backdoor that could be used to compromise sites. The plugin recently changed hands, allowing the attackers to purchase a widely-used plugin that could be silently updated to spy on users.

IT leaders turn to AI to defend against AI-powered cyberattacks

Over 90% of cybersecurity leaders are concerned hackers will use AI to attack their company, according to a new report. Faced with increasingly sophisticated threats, businesses are looking towards defences which use AI to proactively respond to attacks.

HP admits to installing keylogger on hundreds of laptops

HP has admitted to installing a keylogger on hundreds of its laptops. Some of the company's most popular models are among those affected. The code was discovered inside HP's keyboard driver software by a security researcher investigating laptop keyboards.

Botnet of 100,000 routers could unleash cyberattack at any moment

A botnet of 100,000 home broadband routers is lying dormant and could be activated at any time, according to a security researcher. A new strain of the virulent IoT malware Mirai is being used to amass devices, perhaps in preparation for a major attack.

Nokia: Android smartphones biggest malware target in 2017

Android smartphones accounted for the majority of malware attacks over the past year, behind devices running Windows. The figures come from Nokia's Threat Intelligence Lab which warned more needs to be done to keep mobile users secure.

Antivirus software could help malware infect your PC

An antivirus software exploit could allow malware to escape quarantine and infect your system. A vulnerability found in several antivirus solutions gives an attacker a way to bypass usual mechanisms and gain full control of sensitive filesystem areas.

Op-Ed: MIT — Rethinking the realities of Augmented Reality

Sydney - Between the teeming hordes of hype merchants and the very meagre actual products, augmented reality is taking some baby thinking steps into practical things. MIT is looking at making AR safe for users.

Equifax website has been hacked again with fake Flash update

Equifax, the credit rating reporting agency that exposed personal data of nearly 150 million people, (and recently was awarded a contract by the IRS to confirm taxpayer's identities), appears to have been hacked — again.

Rise in websites using your CPU to mine cryptocurrency

More websites are including cryptocurrency miners that use your device's CPU to generate digital coins. After a miner was found on The Pirate Bay last month, more torrent sites have added scripts. Hackers are also adding miners to websites they hijack.

CCleaner malware might have been designed to steal trade secrets

The malware found bundled with popular computer maintenance software CCleaner was designed to compromise machines at some of the world's biggest tech companies. The discovery suggests the attack was more significant than first thought.

Small businesses suffer as ransomware epidemic grows

Small businesses are suffering from a ransomware epidemic. Firms have paid out a total of over $300 million in the past year, leaving them unable to make investments to develop their business. Recovering from the data loss can be an even greater struggle.

8 billion Bluetooth devices at risk of attack

Security researchers have discovered a flaw in Bluetooth that leaves almost every Bluetooth-enabled device vulnerable. It gives the attacker the ability to run malicious code. It's an example of what could go wrong with the Internet of Things.

Security-minded web browser Cocoon goes free for all

A free web browser is aiming to offer privacy-minded Internet users a safer way to navigate online. Cocoon uses cloud technology to proactively protect against hacks, ransomware and malicious sites. It also comes with encryption and an IP address shield.
  1 2 3 4 5 6 ... 7 Next»

Set up a news alert for

Malware


Malware Image

The Rombertik malware wipes hard drives when detected
The Rombertik malware wipes hard drives when detected
Cisco
No More Ransom helps people recover from ransomware attacks
No More Ransom helps people recover from ransomware attacks
No More Ransom
The known reach of the Slingshot malware
The known reach of the Slingshot malware
Kaspersky Labs
TeslaCrypt encrypts game files on infected systems  demanding a ransom for their release
TeslaCrypt encrypts game files on infected systems, demanding a ransom for their release
Bromium Labs
 Missing fonts  Chrome malware
"Missing fonts" Chrome malware
Mahmoud Al-Qudsi
Gooligan malware
Gooligan malware
Check Point Security Technologies
The malware bundled with CCleaner targeted  at least  20 of the world s largest tech firms
The malware bundled with CCleaner targeted "at least" 20 of the world's largest tech firms
Pexels / Tookapic
Babylon is another scam search engine. Don t click the link  don t click anything  close the page an...
Babylon is another scam search engine. Don't click the link, don't click anything, close the page and get rid of it.
Infected USB sticks delivered to mailboxes in Melbourne
Infected USB sticks delivered to mailboxes in Melbourne
Victoria Police Force
Gooligan malware
Gooligan malware
Check Point Security Technologies
The malware authors manipulated search results
The malware authors manipulated search results
Symantec
 Missing fonts  Chrome malware
"Missing fonts" Chrome malware
Mahmoud Al-Qudsi
Fake Windows 10 activation ransomware prompt
Fake Windows 10 activation ransomware prompt
Symantec
Don t be fooled. There is NO such compulsory update from Yahoo! or anyone else. Give InboxAce a miss...
Don't be fooled. There is NO such compulsory update from Yahoo! or anyone else. Give InboxAce a miss.
Mamba ransomware infects the MBR to display a custom decryption prompt before Windows starts
Mamba ransomware infects the MBR to display a custom decryption prompt before Windows starts
Renato Marinho
Typical invoice email sent by Necurs botnet.
Typical invoice email sent by Necurs botnet.
Symantec
Torrent client uTorrent has been found to try to install the resource-hogging Bitcoin miner Epic Sca...
Torrent client uTorrent has been found to try to install the resource-hogging Bitcoin miner Epic Scale along with itself
How-To Geek
Gooligan malware
Gooligan malware
Check Point Security Technologies
InstaAgent  an Instagram client that stole the passwords of hundreds of thousands of users
InstaAgent, an Instagram client that stole the passwords of hundreds of thousands of users
David-LR (@PeppersoftDev)
One of the fake malware recovery sites
One of the fake malware recovery sites
Symantec

Latest News
Top News