Security Experts:

Virus & Malware
long dotted


An update released by Webroot caused the company’s antivirus to detect legitimate files as W32.Trojan.Gen [Read More]
Company confirms cybercriminals used malware to steal payment card data from nearly 40 Shoney’s restaurants [Read More]
Malware used in targeted attacks in South Korea and Japan padded with junk data to evade detection - sample sizes range between 50 Mb and 200 Mb [Read More]
Microsoft this week ended support for its Windows Vista operating systems, while at the same time rolling out Windows 10 Creators Update to its users. [Read More]
Callisto is a threat actor that has spied on entities with an interest in foreign and security policy in Europe and South Caucasus [Read More]
Symantec determined that some of WikiLeaks’ CIA exploits are very similar to ones used by a cyberespionage group it tracks as Longhorn [Read More]
WikiLeaks publishes documents detailing Grasshopper, a platform used by CIA to create Windows malware installers [Read More]
A new IoT/Linux botnet dubbed Amnesia targets DVRs using an unpatched vulnerability disclosed one year ago [Read More]
Hackers linked to China hijacked the website of a U.S. trade group in an effort to deliver reconnaissance malware to visitors [Read More]
Recently patched Apache Struts 2 vulnerability is now being used to deliver Cerber ransomware to Windows servers [Read More]

FEATURES, INSIGHTS // Virus & Malware

rss icon

Zeus 2.1 now boasts features that help it avoid analysis and hostile takeover from law enforcement, researchers, or competing cybercriminal organizations.
David Harley's picture
David Harley chimes in with some thoughts on the latest developments from the AMTSO and the Anti-Malware Industry.
David Harley's picture
The vulnerability in Windows Shell’s parsing of .LNK (shortcut) files presents some interesting and novel features in terms of its media lifecycle as well as its evolution from zero-day to patched vulnerability. For most of us, the vulnerability first came to light in the context of Win32/Stuxnet, malware that in itself presents some notable quirks.
David Harley's picture
The anti-malware industry sometimes sees more complicated problems than you might imagine, and they can’t all be fixed by tweaking detection algorithms or giving the marketing team a productivity bonus.
Mike Lennon's picture
Malvertising - Popular websites, blogs, and ad networks are fast becoming the preferred means of cybercriminals, identity thieves, and hackers to steal consumer information and distribute malicious content.
Markus Jakobsson's picture
Anti-virus products scan for malware in two ways. They look for sequences of bits that are found in programs that are known to be “evil” (but which are not commonly found in “good” programs)...