Malware

Malware news, analysis, research, how-to, opinion, and video.

Oracle fixes zero-day Java flaw and over 190 other vulnerabilities

Users should update Java as soon as possible because attackers are already taking advantage of at least one vulnerability

Hacking Team's arsenal included at least three unpatched exploits for Flash Player

The vulnerabilities leveraged by two of the exploits have yet to be patched


mac app store
Update

Zero-day exploit lets App Store malware steal OS X and iOS passwords

Researchers discover an exploit that lets OS X and iOS malware in the App Store steal passwords and app data, as well as hijack session tokens

computer security stock image

Businesses ill-prepared to defend against dramatic rise in zero-day attacks

The Check Point 2015 Security Report highlights a number of key security trends, including the impact of the rise of zero-day attacks

thinkstock dunce cap shame shaming

SourceForge commits reputational suicide

Despite seeming reformed last year, download hosting site SourceForge has been caught red-handed abusing the reputations of open source projects

A fly using a walker

Superbugs: 11 software bugs that took way too long to squash

All software has bugs, but even the most well known applications can have errors and vulnerabilities that somehow go undetected for years -- or decades.

Large-scale attack hijacks routers through users' browsers

Security researchers have found a Web attack tool designed specifically to exploit vulnerabilities in routers and hijack their DNS settings

Injection syringe needle vaccinate

Code injection: A new low for ISPs

Beyond underhanded, Comcast and other carriers are inserting their own ads and notifications into their customers’ data streams

adware malware banners

Malicious adware more than doubled last year

The amount of adware discovered online doubled as cyber criminals adjusted their strategy in the wake of better security elsewhere

Scam definition

Google stomps on scammers -- and helps open source

A recent rules change to Google Adwords may make it easier for open source projects to protect their good reputation

Controversial MacKeeper security program opens critical hole on Mac computers

The program's developers are urging users to update to its latest version as soon as possible

GPU malware can also affect Windows PCs, possibly Macs

A team of anonymous developers is trying to raise awareness about GPU malware

New Linux rootkit leverages GPUs for stealth

The Jellyfish proof-of-concept rootkit uses the processing power of graphics cards and runs in their dedicated memory

Rombertik malware destroys computers if detected

Rombertik is designed to steal any plain text entered into a browser window

mayberry sheriff car police car retro revival antique 000000147714

We need the Internet police now more than ever

Beyond the reach of traditional policing, Internet crime calls for a new kind of law enforcement agency

With ransomware on the rise, cryptographers take it personally

The security industry is not doing enough and it's going to get worse, cryptographers said

android chorus

For Android, adware is the threat, not malware

Security alarmists have grossly exaggerated the risk of mobile devices -- and the cost of security breaches

Large-scale Google malvertising campaign hits users with exploits

Malvertising has been a growing problem for years

malware bug virus security magnifying glass detection

Fast and effective malware detection -- for free

Everyone discovers software on the Internet that looks like the right tool for a specific job. But is it safe? The Malwr malware detection site can tell you

Internet of Things hack security smart home

Smart home hacking is easier than you think

Scary stories of hacking Internet of Things devices are emerging, but how realistic is the threat?

Load More