Malware

Malware news, analysis, research, how-to, opinion, and video.

Adobe Flash is closer to being wiped away
A new version of the sophisticated Duqu malware is used for spying

malware adware

Who can stop malware? It starts with advertisers

Malware masquerading as advertising is a growing problem, and the ad industry must figure out how to weed out scammers from legitimate companies

Asprox botnet, a long-running nuisance, disappears

Asprox's operators may be regrouping to evade detection, according to Palo Alto Networks

Apple computers vulnerable to 'Thunderstrike 2' firmware worm

The improved attack highlights ongoing concerns over the security of a computer's low-level code

Critical BIND denial-of-service flaw could disrupt large portions of the Internet

The flaw could be exploited remotely to crash DNS servers by sending them a single packet

Oracle fixes zero-day Java flaw and over 190 other vulnerabilities

Users should update Java as soon as possible because attackers are already taking advantage of at least one vulnerability

Hacking Team's arsenal included at least three unpatched exploits for Flash Player

The vulnerabilities leveraged by two of the exploits have yet to be patched

mac app store
Update

Zero-day exploit lets App Store malware steal OS X and iOS passwords

Researchers discover an exploit that lets OS X and iOS malware in the App Store steal passwords and app data, as well as hijack session tokens

computer security stock image

Businesses ill-prepared to defend against dramatic rise in zero-day attacks

The Check Point 2015 Security Report highlights a number of key security trends, including the impact of the rise of zero-day attacks

thinkstock dunce cap shame shaming

SourceForge commits reputational suicide

Despite seeming reformed last year, download hosting site SourceForge has been caught red-handed abusing the reputations of open source projects

A fly using a walker

Superbugs: 11 software bugs that took way too long to squash

All software has bugs, but even the most well known applications can have errors and vulnerabilities that somehow go undetected for years -- or decades.

Large-scale attack hijacks routers through users' browsers

Security researchers have found a Web attack tool designed specifically to exploit vulnerabilities in routers and hijack their DNS settings

Injection syringe needle vaccinate

Code injection: A new low for ISPs

Beyond underhanded, Comcast and other carriers are inserting their own ads and notifications into their customers’ data streams

adware malware banners

Malicious adware more than doubled last year

The amount of adware discovered online doubled as cyber criminals adjusted their strategy in the wake of better security elsewhere

Scam definition

Google stomps on scammers -- and helps open source

A recent rules change to Google Adwords may make it easier for open source projects to protect their good reputation

Controversial MacKeeper security program opens critical hole on Mac computers

The program's developers are urging users to update to its latest version as soon as possible

GPU malware can also affect Windows PCs, possibly Macs

A team of anonymous developers is trying to raise awareness about GPU malware

New Linux rootkit leverages GPUs for stealth

The Jellyfish proof-of-concept rootkit uses the processing power of graphics cards and runs in their dedicated memory

Rombertik malware destroys computers if detected

Rombertik is designed to steal any plain text entered into a browser window

Load More