An Iranian news agency has said that “malware worse than Stuxnet” may soon be unleashed, to “spy on and destroy the software structure of Iran’s nuclear program”.
Filecoder, an unpleasant and virulent strain of ransomware is now spreading globally, with experts estimating that the gang behind it must be earning “millions”. The surging value of Bitcoin may be helping the criminals, experts say.
The company, E-Sports Entertainment, served up malware which used PCs to mine Bitcoins, an attack which earned $3,602. The malware was delivered surreptitiously alongside the company’s official client.
In the first of a series of guest blog posts AV industry veteran Graham Cluley voices his opinion on how security has changed – and the changes we all need to make for the future.
By the middle of May, users around the world started to receive messages from their contacts through different instant-messaging applications, such as Skype and Gtalk – an attack that showed off how age-old techniques can ensnare thousands of users. Here, we analyze this attack.
Tens of millions of computer users are at risk from Filecoder due to a “mass spamming event”, detailed in an alert from Britain’s National Cyber Crime Unit, which is targeting small businesses with a spam campaign.
A coalition of digital rights organizations and academics recently published an ‘open letter’ to the Anti-Malware/Anti-Virus industry asking for clarification on vendor policies regarding cooperation with government agencies and/or law enforcement using state-sponsored Trojans. This is ESET’s official response.
American PC users are being hit with a new wave of Filecoder ransomware, which locks access to computers and demands $300 – with a ticking timer before files are locked forever, according to US-CERT.
On November 2nd, 1988, the Morris worm was released by its author, and within 24 hours had caused damage across the world. It spread via the internet – and its release marked a new dawn for malicious software. Our five facts highlight what has changed since – and what hasn’t.
A three-year-battle with a mysterious new strain of malware has led researcher Dragos Ruiu to conclude that the BadBIOS malware infesting his lab “jumps” from PC to PC using sound – and can be transmitted without any internet connection.
Users of Google’s Chrome browser will be able to “purge” rogue plug-ins, after attacks where a supposedly helpful browser add-on contains malware – a tactic adopted by cybercriminals, as reported by We Live Security earlier this year.
If sinister pieces of malicious code could rise from the dead on Halloween, which would be the most scary for antivirus researchers? Here are 5 contenders, with a variety of very nasty traits.
We have already discussed how a system gets infected with Win32/Nymaim ransomware. In this blog post, we reveal a new infection vector, a study of the different international locker designs and ransom prices as well as a complete technical analysis of its communication protocol.
Grand Theft Auto V sold more than $1 billion worth of units in a week – no wonder cybercriminals are tempted to cash in. A torrent offering the game on PC has been downloaded “thousands” of times, sites report.
Middle aged PC users routinely ignore warnings that sites may harm their computers – and that figure has doubled since 2011, according to research by ESET Ireland.
Security researchers from Autodesk, along with Microsoft, announced new features in AutoCAD to prevent malware in a presentation at Virus Bulletin 2013 in Berlin. We look at how a simple prompt can help keep users safe.
From legitimate companies delivering software with a “side-order” of malware, to PC attacks that persuade you to infect your own phone, here are some of the latest traps laid by cybercriminals – and how to sidestep them.
In this blog post, we will describe software detected by ESET products as Win32/Kankan, and explain why its discovery shocked many Chinese users, then we will provide an in-depth analysis of its functionalities – and discuss the evidence that Xunlei Networking Technologies is implicated.