Once in a while we get to spend time analyzing malicious code that is not as widespread as other threats we've encountered. Here we analyze a targeted attack used in Taiwan and Vietnam - but is this 'APT' really that advanced?
A vulnerability in Android could allow attackers to “unlock” phones without cracking PIN codes - using malware to deactivate Google’s locks on handsets and tablets. The vulnerability can “turn off” all locks a user puts in place.
An audio communication system designed for ultrasonic underwater communications can be used to steal data - even from disconnected PCs in secure environments, by relaying it to the outside world from PC to PC through computer speakers, researchers claim.
An Iranian news agency has said that “malware worse than Stuxnet” may soon be unleashed, to “spy on and destroy the software structure of Iran’s nuclear program".
A look back at malware failures, malicious code that did not work out as well as the folks behind it had hoped. Can malware spread to quickly for its own good? Can malware authors ever test their wares well enough to work perfectly?
Filecoder, an unpleasant and virulent strain of ransomware is now spreading globally, with experts estimating that the gang behind it must be earning “millions”. The surging value of Bitcoin may be helping the criminals, experts say.
The company, E-Sports Entertainment, served up malware which used PCs to mine Bitcoins, an attack which earned $3,602. The malware was delivered surreptitiously alongside the company's official client.
Graham Cluley: AV shouldn’t just be something on your hard drive – it should be part of a global immune system
In the first of a series of guest blog posts AV industry veteran Graham Cluley voices his opinion on how security has changed - and the changes we all need to make for the future.
By the middle of May, users around the world started to receive messages from their contacts through different instant-messaging applications, such as Skype and Gtalk - an attack that showed off how age-old techniques can ensnare thousands of users. Here, we analyze this attack.
“Tens of millions” at risk from Filecoder due to “mass email spam event” targeting small businesses, British police agency warns
Tens of millions of computer users are at risk from Filecoder due to a “mass spamming event”, detailed in an alert from Britain’s National Cyber Crime Unit, which is targeting small businesses with a spam campaign.
A coalition of digital rights organizations and academics recently published an ‘open letter’ to the Anti-Malware/Anti-Virus industry asking for clarification on vendor policies regarding cooperation with government agencies and/or law enforcement using state-sponsored Trojans. This is ESET's official response.
American PC users are being hit with a new wave of Filecoder ransomware, which locks access to computers and demands $300 - with a ticking timer before files are locked forever, according to US-CERT.
On November 2nd, 1988, the Morris worm was released by its author, and within 24 hours had caused damage across the world. It spread via the internet - and its release marked a new dawn for malicious software. Our five facts highlight what has changed since - and what hasn't.
A three-year-battle with a mysterious new strain of malware has led researcher Dragos Ruiu to conclude that the BadBIOS malware infesting his lab "jumps" from PC to PC using sound - and can be transmitted without any internet connection.
Users of Google's Chrome browser will be able to "purge" rogue plug-ins, after attacks where a supposedly helpful browser add-on contains malware - a tactic adopted by cybercriminals, as reported by We Live Security earlier this year.
If sinister pieces of malicious code could rise from the dead on Halloween, which would be the most scary for antivirus researchers? Here are 5 contenders, with a variety of very nasty traits.
We have already discussed how a system gets infected with Win32/Nymaim ransomware. In this blog post, we reveal a new infection vector, a study of the different international locker designs and ransom prices as well as a complete technical analysis of its communication protocol.
Grand Theft Auto V sold more than $1 billion worth of units in a week - no wonder cybercriminals are tempted to cash in. A torrent offering the game on PC has been downloaded "thousands" of times, sites report.
Middle aged PC users routinely ignore warnings that sites may harm their computers - and that figure has doubled since 2011, according to research by ESET Ireland.
The detection and blocking of malicious code employed by modern threats, whether targeted attacks or mass-spreading campaigns, has been a game of cat-and-mouse for some time now. Is it time for a new approach?