Malware attacks seem to be evolving. The traditional viruses, Trojan horses, botnets and phishing attacks are still a threat, but the next generation malware takes insidious to a whole new level. Thankfully, theres a silver lining as well. ...
Tags: Malware, attacks, traditional viruses, Trojan horses, botnets
A new variant of a Trojan program called Reveton that prevents victims from using their computers and displays rogue messages from law enforcement agencies is using localized voice messages to trick victims into paying made-up fines, ...
Tags: Reveton, victims, computers, displays, antivirus vendor, Trend Micro
IDG News Service - Attackers are exploiting a new and unpatched vulnerability that affects the latest version of Java -- Java 7 Update 6 -- in order to infect computers with malware, according to researchers from security vendor FireEye. ...
IDG News Service - Cybercriminals are using computers infected with a particular piece of malware to power a commercial proxy service that funnels potentially malicious traffic through them, according to security researchers from Symantec. ...
Tags: Cybercriminals, computer, malware, commercial proxy service
Computerworld - Two security organizations have released online tools that let Windows users check for possible infections by Gauss, the newly-revealed cyber surveillance malware thought to have been built by one or more governments. ...
Tags: security organization, online tools, Windows, cyber surveillance
IDG News Service - Google on Thursday dismissed the possibility that a new wave of pharmacy, penny stock and e-card spam emails are being sent by Android spam botnets. "Our analysis suggests that spammers are using infected computers and ...
Tags: Google, pharmacy, penny stock, spam email, computers
Hackers using a Remote Access Trojan (RAT) named Mirage have been engaged in a systematic cyber espionage campaign against a Canadian energy company, a large oil firm in the Philippines and several other entities since at least this April, ...
Tags: Hackers, RAT, Mirage, systematic cyber espionage, energy company
Microsoft today released an emergency patch for Internet Explorer (IE) to stymie active attacks that have been exploiting a bug in the browser, finishing a job it started only Monday. "Let's call it five days from advisory to patch," said ...
Tags: Microsoft, emergency patch, IE, stymie active attacks, bug
A sophisticated cyber surveillance tool that monitors financial transactions with Middle Eastern banks was probably built by or under the auspices of a government, security researchers said today. Early Thursday, Moscow-based Kaspersky ...
Tags: cyber, financial transactions, Middle Eastern, banks, security
Japan's Finance Ministry has uncovered evidence of a major Trojan cyber-attack on its computer systems that lay undetected for almost two years, according to local sources. Ministry officials have admitted that the unspecified Trojan, ...
Tags: Japan, Finance Ministry, Trojan cyberattack, computer systems
Security researchers from Symantec have identified an information-stealing Trojan program that was used to infect computer servers belonging to various U.S. financial institutions. Dubbed Stabuniq, the Trojan program was found on mail ...
Java's recent security woes are not scaring off developers, who don't see Java as any more vulnerable than any other platform. "There's nothing fundamentally wrong with Java," says Gonzalo Diethelm, in charge of architecture and development ...
Tags: Java, security woes, developers, security
The creators of Carberp, a banking Trojan program used exclusively in Russian-speaking countries, have started to sell an improved version of the malware together with custom scripts that would allow cybercriminals to target U.S. online ...
Tags: Carberp Malware, Banks, Computer Products
New configurations of the Shylock financial malware inject attacker-controlled phone numbers into the contact pages of online banking websites, according to security researchers from antivirus vendor Symantec. By doing this, the attackers ...
Tags: Shylock financial malware, phone numbers, contact pages
A new Trojan horse tries to covers its tracks by crippling the victim's computer after stealing data, a security researcher said today. Dubbed "Shamoon" by most antivirus companies, the malware has been used in targeted attacks aimed at ...
Tags: Trojan horse, tracks, victim's computer, shamoon malware, Windows PCs