Malware

Malware news, analysis, research, how-to, opinion, and video.

security target

Salesforce.com warns customers of malware attack

A new version of the Dyreza online banking Trojan is stealing Salesforce.com log-in credentials


What you need to know about the Home Depot data breach

Here's a quick run down on the data breach that impacted debit and credit cards used at the world's largest home improvement retailer

Home Depot confirms breach of its payment systems

Customers will not be held responsible for fraudulent charges, the company said

Configuration errors lead to HealthCare.gov breach

HHS says an attacker gained access to the HealthCare.gov server, but no personal information was compromised

Reconnaissance code on industrial software site points to watering hole attack

Attackers are using a sophisticated Web-based tool to gather information on potential targets, researchers from AlienVault said

CryptoWall held over half a million computers hostage, encrypted 5 billion files

The cyber criminals behind this dangerous ransomware program have received $1 million so far, researchers from Dell SecureWorks said

U.S. warns 'significant number' of major businesses hit by Backoff malware

Backoff malware is stealing credit card details, according to a cyber security alert

So long, iOS -- jailbreakers have found their home: Android

Jailbreakers deserve the malware infections they get, which is why they're moving to Android's 'malware is the norm' world

The UPS Store says malware found on systems of 51 stores

Names, postal, and email addresses and payment card data may have been exposed

Google broadens its malware sleuthing to sniff out deceptive downloads

More types of malicious software will be identified by Google's safe browsing service

New Gameover Zeus botnet growing in the U.S.

A new Gameover Zeus malware variant has infected over 10,000 systems so far, researchers say

The biggest iPhone security risk could be connecting one to a computer

Design quirks allow malware to be installed on iOS devices and cookies to be plucked from Facebook and Gmail apps

How hackers used Google to steal corporate data

Attackers used Google Developers and public DNS to disguise traffic between the malware and command-and-control servers

Malware no longer avoiding virtual machines

Symantec finds most malware these days doesn't quit on VMs, which used to be a tactic to avoid security checks

10 things you need to know about Microsoft's Surface Pro 3

The Surface Pro 3 sports some impressive capabilities. Here's the scoop on its software to its performance to its sound and camera

Most USB thumb drives can be reprogrammed to infect computers

The firmware in such devices is unprotected and can be easily overwritten by malware, researchers from Security Research Labs said

Android vulnerability allows malware to compromise most devices and apps

Attackers can impersonate trusted developers to gain powerful privileges on the OS, researchers from Bluebox Security say

Cyber criminals ride Google coattails in DDoS attacks

Cyber criminals are able to launch distributed denial-of-service attacks against websites by pretending to be Google Web crawlers

Thousands of sites compromised through WordPress plug-in vulnerability

Hackers are actively exploiting a vulnerability found recently in the MailPoet Newsletters plug-in for WordPress

Load More