Virus alerts  

  •  
  • By Catalin Cimpanu
  • October 3rd, 2015
Linux-Targeting Malware Sets Up Proxies on Infected Machines

Linux-Targeting Malware Sets Up Proxies on Infected Machines

Duo of Linux trojans used to launch SSH brute-force attacks

  •  
  • By Catalin Cimpanu
  • October 3rd, 2015
Fareit Malware Uses Different File Hash for Each Attack to Avoid AV Detection

Fareit Malware Uses Different File Hash for Each Attack to Avoid AV Detection

Malware uses different file hashes, but the same file names

  •  
  • By Catalin Cimpanu
  • October 2nd, 2015
Android Malware Disguises as PayPal App

Android Malware Disguises as PayPal App

Only German users are targeted right now

  •  
  • By Catalin Cimpanu
  • October 2nd, 2015
Latest Upatre Trojan Version Targets Windows XP Users

Latest Upatre Trojan Version Targets Windows XP Users

XP is not dead, at least not for cyber-criminals

  •  
  • By Catalin Cimpanu
  • October 1st, 2015
Internet of Things (IoT) Devices Infected by Over-Protective Malware

Internet of Things (IoT) Devices Infected by Over-Protective Malware

Linux.Wifatch protects your devices from other infections, instead of stealing your data or launching DDoS atacks

  •  
  • By Catalin Cimpanu
  • October 1st, 2015
Breaking Bad Ransomware Goes Completely Undetected by VirusTotal

Breaking Bad Ransomware Goes Completely Undetected by VirusTotal

Would you like a touch of Walter White with your malware?

  •  
  • By Catalin Cimpanu
  • September 30th, 2015
Dyreza Banking Trojan Retooled to Target Supply Chain Businesses

Dyreza Banking Trojan Retooled to Target Supply Chain Businesses

Hackers change attack surface to boost their profits

  •  
  • By Catalin Cimpanu
  • September 29th, 2015
Trojan Found Pre-Installed on Some Android Devices

Trojan Found Pre-Installed on Some Android Devices

Trojan comes pre-installed on Oysters T104 HVi devices

  •  
  • By Catalin Cimpanu
  • September 28th, 2015
VBA Malware Makes a Comeback Inside Booby-Trapped Word Documents

VBA Malware Makes a Comeback Inside Booby-Trapped Word Documents

50 to 100 new VBA malware samples discovered each month

  •  
  • By Catalin Cimpanu
  • September 25th, 2015
Kasidet DDOSing Bot Adds Credit Card Scraping Capabilities

Kasidet DDOSing Bot Adds Credit Card Scraping Capabilities

DDOS bot gets upgraded with PoS RAM scraping feature

  •  
  • By Catalin Cimpanu
  • September 25th, 2015
Kovter Malware Now Lives Solely in the Windows Registry

Kovter Malware Now Lives Solely in the Windows Registry

Half of the Kovter-infected users live in the US

  •  
  • By Catalin Cimpanu
  • September 19th, 2015
Ghost Push Android Malware Infects 600,000 New Users per Day

Ghost Push Android Malware Infects 600,000 New Users per Day

Android devices affected by nearly uninstallable virus

  •  
  • By Catalin Cimpanu
  • September 11th, 2015
Scrawny CoreBot Info Stealer Evolves into Deadly Banking Trojan in Less than 2 Weeks

Scrawny CoreBot Info Stealer Evolves into Deadly Banking Trojan in Less than 2 Weeks

CoreBot is now capable of taking over live banking sessions

  •  
  • By Catalin Cimpanu
  • September 7th, 2015
Android Pornography App Takes Pictures of Users and Blackmails Them for Cash

Android Pornography App Takes Pictures of Users and Blackmails Them for Cash

There's a way to remove the ransom message when infected

  •  
  • By Catalin Cimpanu
  • August 30th, 2015
CoreBot: There's a New Information Stealer in Town

CoreBot: There's a New Information Stealer in Town

CoreBot has a big appetite for your passwords

  •  
  • By Catalin Cimpanu
  • June 16th, 2015
Stegoloader, the Malware That Hides in Image Files

Stegoloader, the Malware That Hides in Image Files

Stegoloader can hide its source code inside a plain PNG file

  •  
  • By Ionut Ilascu
  • March 24th, 2015
Yebot Backdoor Built for Wide Range of Malicious Operations

Yebot Backdoor Built for Wide Range of Malicious Operations

Includes RDP, FTP and SOCKS 5 server support

 
Want more? Browse: