In this blog we describe a sophisticated backdoor, called Dino by its creators. We believe this malicious software has been developed by the Animal Farm espionage group, who also created the infamous Casper, Bunny and Babar malware.
What is a proxy and what types of proxies exist? What protocol are used in the anonymization process? How does anonymity help with malware investigations?
The website of celebrity TV chef and food activist Jamie Oliver has been compromised with malware for the third time this year, potentially infecting the computers of the site’s visitors.
Researchers have uncovered a new malware which will try to ‘destroy’ the computer, reports Cisco. Let’s understand how it really is.
Two major hospitals in the United States are trialling a new system for detecting malware on medical devices, using probes that monitor AC power consumption to detect infections.
A new advanced malware program targeting point-of-sale terminals is putting customer credit card details at risk, following a number of similar attacks already this year.
A lawyer in Arkansas is claiming that police planted three different pieces of malware on an external hard drive in a controversial whistleblower case against the police force, reports 5 News Online.
Gamers downloading from Steam should beware of fake game pages, after a spate of clone titles were found on the service hiding harmful malware.
Wordpress sites are being targeted by a Pirate Bay clone set up by hackers to distribute malware and a banking trojan, reports The Next Web.
Google is taking additional security measures to shut out malware from its app store by introducing a human screening process.
A cat leads to a notorious death threat hacker finally being caught and jailed in Japan.
A security researcher describes how malware could infect your Mac’s boot ROM, and spy on your activities, with little chance of you ever realising.
Microsoft has warned of a new variant of a banking malware that appears to be targeting German speakers, according to PC World.
Cybercriminals once again had gamers in their sights this week, with leaks of multiple account details and a new Steam scam – but there was good news in the form of upgraded security on Whatsapp, and dawning awareness on privacy.
The latest salacious video – promising ‘Naked Woman Eaten by a Shark’ – is just one in a long chain of viral video scams spread via Faceboook.
A team of Israeli researchers has demonstrated a way to hack into an ultra-secure air-gapped network, install malware, and retreive information – without using hardware such as USB keys.
IT security staff have spent the last few weeks fighting hackers in the White House, after a computer network was breached. But can we tell who was behind the attack?
La virtualización empieza a ser insuficiente considerando que nos enfrentamos a malware cada vez más “consciente” de técnicas de sandboxing. Una de las charlas Virus Bulletin esta semana estuvo relacionada con las principales estrategias utilizadas en los códigos maliciosos para detectar los sandbox y las consecuencias en los resultados de los análisis.
This week, a serious software vulnerability, which rapidly became known as the ‘Bash Bug’ or ‘Shellshock’ dominated the headlines, as two other faked news stories showed that hoaxes can fool the world very easily these days.