In this blog post, we provide an in-depth analysis of Linux/Ebury - the most sophisticated Linux backdoor ever seen by our researchers....
The increasing use of QR codes as a way to add interactive elements, apps and websites to display advertising, competitions or print...
Malware dubbed ‘Moon’ due to images found within the malware has spread rapidly through many models of Linksys routers - even ones...
If your system administrator looks a little frazzled this week, be nice to him or her and don't grumble too much about...
A little-known banking trojan, developed in Russia, has managed to infect thousands of victims' computers without the knowledge of their owners. Graham...
A statistical tool first used in 1966 and currently used in speech and gesture recognition may hold a key to sniffing out...
Facebook has given out a record fee for bug discovery, after a Brazilian security researcher exposed a vulnerability that could have been...
In this post, we examine the complex it fits into a larger click fraud ecosystem, where users can be redirected either automatically,...
At CES 2014, the app was king - and more importantly, the appcessory - fridges, lights, appliances and gadgets built for app...
This is the first in a series of two blog posts on the malware family Win32/Boaxxe.BE whose end goal is to drive...
A new app, Snoopwall, could offfer Android users some protection against apps which listen to user data - and transmit it -...
Death of a Sales Force: Whatever Happened to Anti-Virus? is a paper written by Larry Bridwell and myself for the 16th AVAR...
The first sign we saw of this malware was in mid-May 2013, but it is still very active, and uses Android to...
In September we informed about a new banking trojan called Hesperbot (detected as Win32/Spy.Hesperbot). The perpetrators responsible for the threat are still...
Once in a while we get to spend time analyzing malicious code that is not as widespread as other threats we've encountered....
A vulnerability in Android could allow attackers to “unlock” phones without cracking PIN codes - using malware to deactivate Google’s locks on...
An audio communication system designed for ultrasonic underwater communications can be used to steal data - even from disconnected PCs in secure...
An Iranian news agency has said that “malware worse than Stuxnet” may soon be unleashed, to “spy on and destroy the software...
A look back at malware failures, malicious code that did not work out as well as the folks behind it had hoped....
Filecoder, an unpleasant and virulent strain of ransomware is now spreading globally, with experts estimating that the gang behind it must be...
The company, E-Sports Entertainment, served up malware which used PCs to mine Bitcoins, an attack which earned $3,602. The malware was delivered...