Malware

Avalanche takedown involved searches in 40 countries

Avalanche takedown involved searches in 40 countries

By

In making its announcement on Monday of the shutdown of Avalanche, the US Department of Justice said it turned the tables on the criminals, "by targeting not just individual actors, but the entire Avalanche infrastructure."

Stegano malvertising campaign invades major news websites, warns report

Stegano malvertising campaign invades major news websites, warns report

By

A recently discovered exploit kit called Stegano is infecting select machines via malicious banner ads that, by conservative estimates, have been delivered to over a million users in just the last two months.

Shamoon wiper malware returns after four year hiatus

Shamoon wiper malware returns after four year hiatus

By

Shamoon wiper malware has been spotted for the first time in four years, according to Palo Alto and Symantec

NetWire RAT acts as keylogger, steals payment card data

NetWire RAT acts as keylogger, steals payment card data

By

Criminals used a remote access trojan with keylogging capabilities rather than traditional point-of-sale malware.

YouTubers sell phishing kits in plain view

YouTubers sell phishing kits in plain view

By

YouTube appears to be the latest host of cybercrime advertising, as researchers unveil that they've found criminals advertising phishing kits on the video hosting site.

Can you hear me now? Malware turns headphones into mics for eavesdropping

Can you hear me now? Malware turns headphones into mics for eavesdropping

By

Headphones plugged into a computer's audio output jack can be converted into a microphone that secretly records nearby conversations by modifying the device's software via malware, according to a new research report.

On the Gatak: Trojan gang lures victims with fake software keys

On the Gatak: Trojan gang lures victims with fake software keys

By

The old adage that crime does not pay is not only applicable those cyber-criminals who are caught, but also to many of the victims of the Gatak Trojan who download it while attempting to gain access to pirated software.

The new measure of security: visibility

The new measure of security: visibility

Kasey Cross discusses the importance of having the ability to see active attackers on your network at work

Banking Trojan seeks system privileges and can circumvent Android security

Banking Trojan seeks system privileges and can circumvent Android security

By

Comodo Threat Research Labs has recently detected the "Gugi/Fanta/Lime" family of financial malware within the Russian economic sector.

ATM machines under attack, spitting out cash on demand

ATM machines under attack, spitting out cash on demand

By

Cyber-security firm Group IB has released a report on a group currently ransacking ATMs throughout Europe using malware which causes ATMs to spit out cash.

Inadequate cyber-security budgets 'putting NHS patients at risk'

Inadequate cyber-security budgets 'putting NHS patients at risk'

By

Some NHS trusts were spending as much as £100,000 a year on cyber-security in 2015 while others were spending nothing, according to figures collated by Sky News.

New versions of SpamTorte discovered

New versions of SpamTorte discovered

By

Verint details discovery of SpamTorte 2.0, an Advanced multi-layered spambot campaign which they said is "back with a vengeance".

Study finds malware lurking in Amazon, Google and Groupon cloud services

Study finds malware lurking in Amazon, Google and Groupon cloud services

By

A recent study detected more than 600 cloud repositories hosting malware and other malicious activities on major cloud platforms.

Researchers spot first cryptor to exploit Telegram protocol

By

Kaspersky Lab researchers Anton Ivanov and Fedor Sinitsyn spotted what they are calling the first encryption malware to exploit the Telegram protocol.

Chrome exploit allows Svpeng Trojan to bypass security measure; patch reportedly coming

Chrome exploit allows Svpeng Trojan to bypass security measure; patch reportedly coming

By

Experts at Kaspersky Lab now understand how the mobile banking trojan Svpeng has been able to automatically download itself via malvertising ads while bypassing Google Chrome browser permissions.

Researchers discover Gootkit upgrade and access C&C server

By

Security researchers discovered an upgraded version of the Gootkit bot targeting clients of European banks.

Phishing emails promising invites to cyber-security conference actually dispersing malware

By

Threat actors have been discovered trying to infect security-minded individuals with a trojan downloader by sending spear-phishing emails that offer free invitations to Palo Alto Networks' Cyber-Security Summit in Jakarta, Indonesia.

Happy Halloween: Top 5 scariest malware families revealed!

By

Just in time for a Halloween spook, the top five scariest malware families have been identified.

CloudFanta campaign suspected of stealing 26K email credentials

By

Researchers spotted a variant of malware campaign dubbed "CloudFanta" which may have been used to steal 26,000 email credentials

4SICS: Shodan founder says IoT here to stay despite security holes

4SICS: Shodan founder says IoT here to stay despite security holes

By

According to John Matherly - internet cartographer, security gadfly and founder of IoT-search engine Shodan - the internet of connected things is very much here to stay.

4SICS: The ICS security challenges faced by a grid operator

4SICS: The ICS security challenges faced by a grid operator

By

Erwin Kooi, information security architect spoke at 4SICS 2016 and shared his thoughts on digitising Alliander's electricity service, while making sure it stays secure.

4SICS: ICS threats are mostly unknown, industry needs more information sharing

4SICS: ICS threats are mostly unknown, industry needs more information sharing

By

Robert M. Lee, CEO of Dragos Inc., says that not enough information sharing happens in ICS industry, because of this the threats to ICSs are largely unknown.

Researchers gain root access to Android devices using Rowhammer attacks

By

An international team of researchers have developed an exploit to "root" access Android phones made by LG, Samsung and Motorola using Rowhammer hardware attacks.

Revamped GM Bot mobile banking malware spotted in wild

Revamped GM Bot mobile banking malware spotted in wild

By

The GM Bot mobile banking malware has been revamped to deploy on Android 6 devices effectively bypassing the security put in place on the operating system.

Hackers sow Discord among gamers

Hackers sow Discord among gamers

By

Cyber-criminals use VoIP services to infect gamers with malware

Election misdirection: Scammers exploiting presidential race with malware, spam and bots

Election misdirection: Scammers exploiting presidential race with malware, spam and bots

By

As Election Day approaches, researchers have detected a marked uptick in malicious cyber campaigns that seek to capitalize on the highly contentious 2016 race for president.

SC Webcasts UK

Sign up to our newsletters

FOLLOW US