tag
Malware

Nuevos ransomware: el Virus de la Policía, ahora para Android

En 2012, el troyano conocido como “Virus de la Policía” afectó a cientos de usuarios en España, Europa y Latinoamérica, cuyas computadoras se bloqueaban al inicio mostrando un supuesto mensaje del Cuerpo Nacional de Policía; con la excusa de haber detectado accesos a páginas de pornografía infantil, solicitaba cierta cantidad de dinero para desbloquear el

Grandes compañías alojan malware según Cisco

Las 30 compañías evaluadas por Cisco durante 2013 alojaban malware en los equipos de sus redes, según el reporte anual publicado por la compañía. Tras analizar el tráfico, se descubrió que se comunicaban con sitios maliciosos, y, en el 96% de los casos, con servidores que habían sido comprometidos por cibercriminales. El estudio se basó

Network structure must change to resist cyber attacks, warns Dr. Eric Cole

Infosecurity expert Dr Eric Cole is to urge companies to take a close look at their network structure, and change it to make attacks difficult for cyber gangs, in a speech given as he is inducted into the Infosecurity Europe Hall of Fame on May 1.

Bad business: ALL major companies are hosting malware – Cisco

Every single one of 30 major companies tested by Cisco over the course of 2013 had malicious traffic on their networks, according to an annual report released by the company. Spyware and other malware was also growing rapidly on mobile devices.

Lack of cyber risk insurance could lead to “global financial shock”

The financial damage caused by a large data breach or malicious employee activity can be enormous, but the lack of financial protection in place could lead to a “global” shock, a report by a leading insurer has warned.

Cybercrime evolves as criminal gangs join forces with spies – report

Hackers targeting sensitive information or stealing from retailers work at such speed that customers often notice data breaches first – and for the first time, cybercriminals are ‘teaming up’ with spies, according to a new report.

Fake Facebook app attack can lead to your Android being spied upon, and your bank account being hacked

Hackers are using a notorious banking Trojan horse to display a bogus message from Facebook, in an aggressive attempt to infect Android smartphones.

Facebook Webinject Leads to iBanking Mobile Bot

iBanking is a malicious Android application that when installed on a mobile phone is able to spy on its user’s communications. This bot has many interesting phone-specific capabilities, including capturing incoming and outgoing SMS messages, redirecting incoming voice calls, and even capturing audio using the device’s microphone.

German security agency warns botnet ‘army’ has harvested 18 million emails and passwords

Scans of a huge botnet have revealed that it has harvested at least 16 million usernames and passwords for email sites and other online services, according to a report released by German security agency, the Bundesamt für Sicherheit in der Informationstechnik (BSI).

Windigo not Windigone: Linux/Ebury updated

There have been some interesting new developments since we published our report on Operation Windigo. In this blog post you will read about a Linux/Ebury update, and the reaction of the criminal gang to our post.

Resumen Trimestral de Amenazas 2014, volumen I: la privacidad como foco

Tenemos el agrado de compartir con ustedes el reporte trimestral de amenazas y tendencias correspondientes a enero, febrero y marzo, meses que se caracterizaron por el descubrimiento y análisis de códigos maliciosos con particularidades como el alto índice de propagación y los ataques a la privacidad de los usuarios. Como han podido informar nuestros expertos, cada

10 years of Mac OS X malware

The malware problem on Mac OS X is nothing like as bad as it is on Windows, but that doesn’t mean it can be ignored.

“New weapon” against malware intrusion designed by American student

A new technique for spotting cyber attacks has been designed by a young American student – and could prevent attacks against planes and power plants, by looking for abnormal communications within computers, rather than sifting for malicious software.

Game over: el soporte para Windows XP llegó a su fin

El día de hoy, 8 de abril, va a quedar en la historia como un hito, porque el soporte oficial de Windows XP llegó a su final. Este acontecimiento tiene un impacto muy importante debido a la popularidad que aún tiene esta versión del SO de Microsoft, especialmente en la industria bancaria: se encuentra en

Win32/Sality newest component: a router’s primary DNS changer named Win32/RBrute

DNS hijacking is still going strong and the Win32/Sality operators have added this technique to their long-lasting botnet. This blog post describes how the malware guesses router passwords as part of its campaign to misdirect users, send spam and infect new victims.

Ransomware, BitCoins y TOR: un paquete completo de cibersecuestro

La semana pasada, nos encontramos en el repositorio de malware que llegan al Laboratorio de Análisis e Investigación de ESET con una amenaza particular, de la cuál queremos compartir su análisis con ustedes. Este malware, no solo causa un dolor de cabeza a sus víctimas, sino que además cifra todos los archivos, documentos e imágenes

El 95% de los cajeros de EE.UU. aún operan con Windows XP

Desde hace varios meses Microsoft está anunciando que va a dejar de dar soporte a Windows XP, hecho que finalmente sucederá el 8 de abril de este año. No obstante, dicha versión del sistema operativo Windows sigue vigente en muchos equipos, como por ejemplo en EE.UU. donde el 95% de los 420 mil cajeros automáticos

Google Glass spyware lets snoopers “see through wearer’s eyes”

Spyware which stealthily takes photographs using Google Glass’s built-in camera and uploads them to a remote server without the user being aware has been demonstrated successfully on the eyepiece – despite Google’s policies explicitly forbidding such programs.

Over 500,000 PCs attacked every day after 25,000 UNIX servers hijacked by Operation Windigo

Malware researchers at ESET have uncovered a widespread cybercriminal operation that has seized control of tens of thousands of Unix servers. Learn more about how to check your systems for compromise, and prevent innocent computer users from being attacked.

Operation Windigo – the vivisection of a large Linux server-side credential-stealing malware campaign

Our report titled “Operation Windigo – the vivisection of a large Linux server-side credential-stealing malware campaign” details our analysis of a set of malicious programs that infect servers and desktop PCs, and send nearly 500,000 web users to malicious content daily.”

Follow Us

Automatically receive new posts via email:

Delivered by FeedBurner

26 articles related to:
Hot Topic
ESET Virus Radar

Archives

Select month
Copyright © 2014 ESET, All Rights Reserved.