Malware

Malware news, analysis, research, how-to, opinion, and video.

OpenDNS trials system that quickly detects computer crime

NLPRank performs language and network analysis on new domains to identify suspicious ones

hacker code security

Navigating a field of uncertainty and doubt questions

Superfish stumper: What did Lenovo know and when did it know it?

There's only thing worse than Lenovo not knowing about Superfish: Lenovo knowing about Superfish

fish surprise shock cartoon

Lenovo: 'We were as surprised as you'

In an exclusive interview, Lenovo's Mark Cohen explains how the Superfish debacle went down. Is this the beginning of the end of shoddy software bundling practices?

malware shield prevent security virus warning

Microsoft helps Lenovo, deletes Superfish 'crapware' and rogue cert

Microsoft today updated its free Windows Defender and Security Essentials antivirus programs to sniff out and delete the rogue certificate linked to Superfish Visual Discovery, the "crapware" that blew up in Lenovo's face this week.

Lenovo admits to Superfish screw-up, will release clean-up tool

The company confirmed that a software program preloaded on some of its laptops exposes users to potential attacks

ssl secure browser security lock

Lenovo shows us why we need to reinvent Web security

What was Lenovo thinking? We can only hope the company's disastrous decision to install adware on laptops that opens users to attack will inspire the industry to revamp SSL

Lenovo Yoga 2 11

Lenovo preinstalls man-in-the-middle adware that hijacks HTTPS traffic on new PCs

If you've bought a Lenovo laptop in recent months it may have come packed with adware called Superfish that also creates massive security holes in your PC

Facebook builds platform for companies to share cybersecurity threat data

Members of the platform will be able to query and upload data about the attacks they had to deal with

Ransomware authors streamline attacks, infections rise

Security researchers spotted improved versions of ransomware programs for both Windows and Android

DDoS malware for Linux systems comes with sophisticated custom-built rootkit

XOR.DDoS is distributed through SSH brute-force password guessing attacks

Adobe pushes critical Flash Player update to fix latest zero-day

Users with automatic updates enabled in Flash Player have already started receiving the new patch

Attackers are exploiting a zero-day vulnerability in Flash Player

The exploit was included in the Angler exploit kit, a security researcher reported

Google nixes widespread malvertising attack

Webmasters were flummoxed when their sites redirected to fraudulent websites hawking products

Macro-based malware is making a comeback, researchers warn

Attackers bypass defenses aganst macros with social engineering to install malware

2014 rearview

Top 10 tech stories of 2014

It's been quite a disruptive year in tech. Here's a look back at the highlights

FBI concludes North Korea 'responsible' for Sony hack

Announcement follows two-week investigation into major cyberattack

The Turla espionage operation also infected Linux systems with malware

A newly identified Linux backdoor program is tied to the Turla cyber espionage campaign, researchers from Kaspersky Lab say

Destructive malware that hit Sony Pictures similar to other data wiping programs

Researchers find similarities between Trojan program used against Sony Pictures and others used in South Korea and Saudi Arabia

Technical evidence links destructive malware to attack against Sony Pictures

The malware contains usernames, passwords, and an image associated with Sony Pictures Entertainment, researchers said

Load More