Gh0st RAT and ADDNEW Backdoor Found Working Side by Side

Gh0st RAT and ADDNEW Backdoor Found Working Side by Side

FireEye researchers say the two are a "match made in heaven"

“People at Skype” Return, Send Out Malicious Password Notifications

“People at Skype” Return, Send Out Malicious Password Notifications

Cybercriminals are leveraging the news about the new worm to induce panic

SourceForge: 400 Users Have Downloaded Corrupted phpMyAdmin

SourceForge: 400 Users Have Downloaded Corrupted phpMyAdmin

The malicious distribution was served from a Korean mirror

Backdoor in phpMyAdmin Allows Hackers to Execute PHP Code

Backdoor in phpMyAdmin Allows Hackers to Execute PHP Code

Only a particular distribution from SourceForge.net is affected

Imuler.B Mac Malware Designed to Avoid Wireshark, Experts Say

Imuler.B Mac Malware Designed to Avoid Wireshark, Experts Say

The new version of the Mac OS X threat comes with some improvements

Androm Trojan Variant Comes in Fake Booking.com Emails

Androm Trojan Variant Comes in Fake Booking.com Emails

The company is warning customers to be on the lookout for such notifications

Experts Find Intel OS X Binary in Multi-Platform Malware

Experts Find Intel OS X Binary in Multi-Platform Malware

The new variant doesn't need additional software to open a reverse shell

Backdoor Served on Colombian Site Affects Mac, Windows and Linux Users

Backdoor Served on Colombian Site Affects Mac, Windows and Linux Users

A malicious .jar file serves a piece of malware after determining the platform

APT Attacks Rely on New Mac OS X Backdoor to Target Uyghur Activists

APT Attacks Rely on New Mac OS X Backdoor to Target Uyghur Activists

Backdoor.OSX.MaControl.b steals files and executes commands on the infected machine

Microsemi Denies Putting Backdoors in Chips

Microsemi Denies Putting Backdoors in Chips

A plot against the US or a clever scenario meant to make China even more "evil"

Malicious PowerPoint Presentations Exploit Flash Vulnerability to Drop Backdoor

Malicious PowerPoint Presentations Exploit Flash Vulnerability to Drop Backdoor

Event innocent-looking files can hide a piece of malware

Backdoor Uncovered in Chinese Chips Used by US Military, Findings Questioned

Backdoor Uncovered in Chinese Chips Used by US Military, Findings Questioned

Cambridge University experts made available the results of their research

Jeremy Lin Malware Exploits Vulnerabilities in Microsoft Office

Jeremy Lin Malware Exploits Vulnerabilities in Microsoft Office

Cybercriminals rely on the NBA star's life story to spread their malware

DotA 2 and Diablo III Beta Testing Cracks Come with Backdoor Trojans

DotA 2 and Diablo III Beta Testing Cracks Come with Backdoor Trojans

Beware of phony beta and demo versions found on file-sharing sites

Antivirii 2011 Scares Users With Fake Infections

Antivirii 2011 Scares Users With Fake Infections

Another piece of scareware has been spotted by security experts

Nitro Cybercriminals Continue Targeting Chemical Companies

Nitro Cybercriminals Continue Targeting Chemical Companies

The hackers have slightly changed their spam emails, but the MO is still the same

Hackers Use Vulnerabilities in Korean Office Software

Hackers Use Vulnerabilities in Korean Office Software

Another fine example of why applications should always be kept up to date

 
Want more? Browse: