Malware

Malware news, analysis, research, how-to, opinion, and video.

The Turla espionage operation also infected Linux systems with malware

A newly identified Linux backdoor program is tied to the Turla cyber espionage campaign, researchers from Kaspersky Lab say

Destructive malware that hit Sony Pictures similar to other data wiping programs

Researchers find similarities between Trojan program used against Sony Pictures and others used in South Korea and Saudi Arabia


Technical evidence links destructive malware to attack against Sony Pictures

The malware contains usernames, passwords, and an image associated with Sony Pictures Entertainment, researchers said

Cheapest tablets pose biggest security risks for enterprises

Kohl's special Black Friday deal tablet includes a security backdoor and four major vulnerabilities

Unlocked circuit board / security threat

The catastrophic state of security in 2014

Can a mega security disaster be avoided? Not if we continue to accept the poor security practices and consequences that persist today

Symantec identifies sophisticated, stealthy Regin malware

The sophisticated back-door-type Trojan was likely developed by a nation state, researcher say

Citadel malware now targets password management applications

A new Citadel configuration steals the master keys for two password managers and a secure authentication program

Free Detekt security tool finds surveillance malware

Open source tool is a joint project of multiple privacy groups who investigated malware used to target journalists and human rights activists

Malware served through rogue Tor exit node tied to cyber espionage group

There is strong evidence the malware dubbed OnionDuke was used to target European government agencies, F-Secure says

Malware doesn't discriminate when it comes to Web ads

Racy or benign, your favorite sites have likely exposed you to malware-laden ads

Vulnerability leaves iPhones and iPads open to fake app attack

Attackers can replace legitimate apps with fake ones that access and steal personal information

Apple security checks may still miss iWorm malware

New research says Gatekeeper and XProtect aren't entirely effective in protecting Mac OS X against iWorm malware

globe with world map and circuit board in background digital 200213603 001

The big one: The makings of a global cyber attack

Surprise -- the underlying technology matters less to an attack's success than basic human determination

Tor Project flags Russian 'exit node' server delivering malware

The server used a technique to append malware to legitimate code

Cyber espionage group launches sophisticated phishing attacks against Outlook Web App users

Pawn Storm attacks target military agencies, embassies, defense contractors, and media organizations, Trend Micro says

ransom note

Ransomware takes malware from bad to worse

To thwart attacks like CryptLocker, you need a multipronged defense; new technology doesn't hurt either

One week after patch, Flash vulnerability already exploited in large-scale attacks

The Fiesta exploit kit bundles an exploit for the CVE-2014-0569 vulnerability in Flash Player, researchers found

Man yelling screaming with data streaming out of megaphone

Enough! Stop hyping every new security threat

Logos for malware? Really? Security vendor marketing wizards are going insane

Mayhem malware spreads through Linux servers via Shellshock exploits

The botnet targets Web servers that haven't been patched for recent vulnerabilities found in the Bash Linux shell

proofpoint screenshot 24

An inside look at Russian cyber criminals

A new report takes a rare detailed look at Russian hackers targeting online banking accounts

Load More