Operation Liberpy’: Keyloggers and information theft in Latin America
White Papers
The Analysis of a Linux Router-based Worm Hungry for Social Networks
CPL Malware in Brazil: Somewhere Between Banking Trojans and Malicious Emails
Linux/Mumblehard is a family of malware targeting servers running both the Linux and BSD operating systems.
Microsoft recently announced its new patch roll-out strategy for the latest incarnation of the Windows operating system. Aryeh Goretsky considers how the Windows 10 patching process might affect both the enterprise and the home user.
Goretsky, A. Windows 10 patching process may leave enterprises vulnerable to zero-day attacks, March 2015, Virus Bulletin. Copyright is held by Virus Bulletin Ltd, but is made available on this site for personal use free of charge by permission of Virus Bulletin.
A new version of our earlier report on major trends in Windows exploitation and mitigation for 2014.
In late 2013, the CryptoLocker ransomware gained a lot of attention. It was hit by Operation Tovar mid-2014. Although they share many similarities, TorrentLocker is a different threat.
This paper, presented at the 2014 AVAR conference, looks at the difficulties and possibilities of implementing cooperative initiatives for teaching computer hygiene in a complex 21st century threatscape.
This paper, presented at Virus Bulletin 2014, shows how the bootkit threat has evolved over time and what further developments the future might bring, as well as some useful tools and mitigations.
A review for Virus Bulletin of two recent eBooks that aim to provide security guidance and tips to consumers.
The vivisection of a large Linux server-side credential stealing malware campaign.
The analysis of four not-so-advanced persistent threats that targeted Vietnam and Taiwan.
ESET, the global leader in proactive digital protection with a record 10 years of consecutive VB100 awards for its ESET NOD32 technology, has released today its annual predictions for the threatscape in the upcoming year “Trends 2014 – The Challenge of Internet Privacy”.
This paper, presented at AVAR 2013, considers the myths about the capabilities of anti-malware technology and demonstrates that reports of its death have been greatly exaggerated.
Pablo Ramos, Security Researcher for Latin America together with his colleagues, has looked into the chronology of a Skype attack. They have captured their investigation in a dedicated White Paper named Chronology of a Skype Attack: The Rodpicom Worm Propagation.
A new white paper, titled Windows 8.1 Security – New and Improved, looks at the some of the most anticipated—and controversial—security features of this new “.1” point release of Windows 8. The white paper also discusses new risks introduced by Windows 8.1, and looks at whether or not IT shops and users should upgrade.
This paper for Virus Bulletin 2013 considers the special challenges that face security product testers when they test products specific to OS X, and the further implications for testing security products on smartphone operating systems. First published in Virus Bulletin 2013 Conference Proceedings*
A new and effective banking trojan has been discovered targeting online banking users in Turkey, the Czech Republic, Portugal and the United Kingdom. It uses very credible-looking phishing-like campaigns, related to trustworthy organizations, to lure victims into running the malware.
Analysis of a banking Trojan using a browser extension as its execution method and spreading via spam, then using a Brazilian government server to collect the victim’s stolen information.
A look at Windows 8 during the first six months of its release. Just how well is it holding up, security-wise? The challenges faced by developers in securing Modern Windows and how piracy in the Windows Store might affect BYOD rollouts in the enterprise.