category
Malware

Identity-exposing malware on Tor “could be work of FBI”

A malware outbreak which reveals the IP addresses of computer users has struck sites on the anonymous Tor network, including some said to host child pornography – with forum users suggesting that the outbreak might be the work of the FBI.

My Back Pages* – Virus Bulletin papers and articles

I recently completed my 14th Virus Bulletin conference paper, co-written with Intego’s Lysa Myers, on “Mac hacking: the way to better testing?” to be presented at the 23rd VB conference in October, in Berlin. The paper itself won’t be available until after the conference, but the abstract is on the Virus Bulletin conference page here.

Revealed: How a “malicious charger” infects iPhone with spyware in under a minute

Borrowing an iPhone charger – or using one in a public place – might be more risky than you think. Researchers from Georgia Tech showed off an attack this week which used a modified iPhone charger to infect an iPhone 5 with spyware in under a minute.

New ransomware uses webcam and Homeland Security threat to scare victims

A new ransomware infection scares its victims by invoking the name of the Department of Homeland Security, and the National Cyber Security Division – and frightens users further by posting a webcam picture.

Versatile and infectious: Win64/Expiro is a cross-platform file infector

Recently, our anti-virus laboratory discovered an interesting new modification of a file virus known as Expiro which targets 64-bit files for infection. File-infecting viruses are well known and have been studied comprehensively over the years, but malicious code of this type almost invariably aimed to modify 32-bit files. One such family of file viruses, called

Android spyware “on rise” as snooper apps multiply

Spyware is a growing threat on Android phones, according to research by Kindsight Labs, a division of Alcatel-Lucent.

Is your new app what it seems? How to spot the latest Android scams

Spotting “bad” apps on Android is not always easy – with cybercriminals finding new tricks every month to fool phone and tablet users into downloading malware.

“Hugely significant” SIM card vulnerability leaves millions of cellphones at risk

Millions of SIM cards in use today are vulnerable to hacking – allowing for attacks where SIM cards could be cloned remotely, or voicemail numbers could be changed, according to a German security researcher.

New ransomware uses Organized Crime unit threat to scare users

New “ransomware” attempts to terrify users into paying up by using the name of Britain’s SOCA crime unit – the Serious Organized Crime Agency, dealing with drugs, people smuggling, human trafficking, major gun crime, fraud and computer crime.

Hacked signal-boosters let cybercriminals “listen in” on cellphones

A $250 signal-boosting device for cellphone users can be hacked, two researchers claim – offering total access to phone calls, internet use and text messages on devices connected to the “femtocell”.

“Warning fatigue” means browser users ignore up to 70% of security alerts

Browser security warnings can work to protect users from phishing and malware sites – but “warning fatigue” means important alerts over site security can be conmpletely ignored.

“Bug bounties” are cheap way to keep companies secure, Berkeley study finds

“Bug bounties” paid out for finding and reporting bugs and vulnerabilities are a cheap and effective way for companies to bolster their security, an independent study by UC Berkeley researchers has found.

U.S. Government destroys $170,000 of PCS in malware scare – even mice and keyboards

A U.S. Government department threw away IT components including printers, computer mice and keyboards in an effort to root out a “sophisticated” and “persistent” malware threat – which did not exist.

Android malware attacks skyrocket in China

Mobile malware is growing at an extraordinary rate in China – with 25 times more detections of malicious programs last year than in 2011, according to official data released this week.

Android “master key” leaves 900 million devices vulnerable, researchers claim

Up to 900 million devices running Android could be affected by a new vulnerability which would allow cybercriminals “full control” over affected handsets, Bluebox Labs has warned.

Know who your Friends are: Staying safe on social sites

Making a mistake on Facebook or other social sites can cost a great deal – either in terms of accidental “oversharing”, or allowing a cybercriminal access to your computer.

The Home Campaign: overstaying its welcome

The Home Campaign is a malware campaign that uses a modified variant of Darkleech to direct visitors to the Blackhole exploit kit. We want to give a better idea of the size and extent of this campaign.

Natural gas plants in U.S. face wave of brute force cyber attacks

Cybercriminals have targeted U.S. energy companies with a wave of brute force cyber attacks, according to the Industrial Control Systems Emergency Response Team (ICS-CERT).

More malware targeting crypto-currencies: Litecoin stealing Trojan found

Bitcoin is not the only crypto-currency targeted by malware now that a Trojan designed to steal Litecoins has been discovered. In this post we review recent discoveries in malware impacting digital money.

Carberp source code leak “could lead to new wave of attacks”

The source code for banking malware Carberp has been released online – raising the possibility a new wave of attacks using variants of the sophisticated Trojan.

Follow Us

Automatically receive new posts via email:

Delivered by FeedBurner

26 articles related to:
Hot Topic
ESET Virus Radar

Archives

Select month
Copyright © 2014 ESET, All Rights Reserved.