The source code for banking malware Carberp has been released online – raising the possibility a new wave of attacks using variants of the sophisticated Trojan.
Computer viruses are making a comeback, according to Microsoft’s Director of Trustworthy Computing – with numbers rising globally in 2012. Tim Rains says that for several years, viruses have been “out of favour with attackers”, but points to statistics showing that they have made a comeback in 2012, at least in certain territories.
ESET Mobile Security has scored full marks for detecting mobile banking threats in a group test conducted by Germany’s AV-TEST magazine, focused on detecting dangerous new banking Trojans.
Emailed wedding invitations have popped back up as a way to distribute malware Will this tactic join other malware-email staples like malicious tax season messages.
Use of pirated and counterfeit Windows software has tripled since 2006, according to analysts IDC – creating a fertile breeding ground for malware. For the report, entitled ‘The Dangerous World of Pirated and Counterfeit Software’, IDC analysts conducted 533 tests on counterfeit software from P2P and web sources.
Protection and remediation tips for Mac OS X users targeted by a Trojan adware plugin called Yontoo hidden behind movie trailer and other media playing links, generating money for criminals exploiting online ad schemes.
Malware infecting 25,000 computers, mostly in the United States, pumping out 80 million spam messages per hour? ESET researchers sinkhole to investigate Win32/TrojanDownloader.Zortob.B
Analysis of malicious code dubbed Win32/Caphaw (a.k.a. Shylock) attacking major European banks, with ability to automatically steal money when the user is actively accessing his banking account.
NBC.com may have sent visitors to infected URLs serving up Trojan software (RedKit) for 24 hours. At the time of this blog post ESET researchers still see some related sites similarly compromised.
Technical analysis of malware that abuses code signing certificates normally used to positively identify a software publisher and to guarantee code is unchanged.
Could distributed denial of service (DDoS) malware be evolving to defeat anti-DDoS security measures like CloudFlare? We do not usually see a lot of innovative denial-of-service malware in our day-to-day work. What we do see usually boils down to the basic flooding techniques: TCP Syn, UDP and ping floods, and sometimes HTTP-oriented floods. Of course,
A shortened and updated version of the advice that David Harley and Andrew Lee gave to potential phish victims in an earlier paper. Part 3 of a three-part article on phishing scams old and new, and some of the ways to recognize the baited hook.
A new attack against Apple Mac OS X Lion (10.7) has been detected by Intego. The threat is a trojan, dubbed Flashback, installed via a fake Adobe Flash installer downloaded from a third party site. As with the MacDefender and Revir malware the Flashback attack uses social engineering to entice the user to download then install
The recent MacDefender Trojan has been receiving “rebranding” facelifts since it came out. It has now been deployed as MacProtector, MacDetector, MacSecurity, Apple Security Center, and there are no doubt more iterations to come. The malware has been updated, and now sports an improved UI that looks like a native Mac OSX application, unlike the