New stolen digital certificates are used by the multi-purpose backdoor Qbot. The criminals behind the Qbot trojan are certainly not inactive. As...
A new trojan has been released targeting the Macintosh Chinese-language user community. The trojan appears to the user to be a...
Recently, we’ve noted a steep rise in Android malware and predicted the rise in banking malware, now we see another example in...
ESET has discovered a new version of the Delphi infector, Win32/Induc. Unlike its predecessors, however, this variant incorporates a seriously malicious payload...
The authors of Win32/Qbot (a.k.a. Qakbot) are back with new variants of this infamous malware, and this time the binaries are digitally...
Awhile back we mused that the rapid rise in Android malware would hit its stride near the intersection of widespread mobile financial...
Among the many different trojans that spread on Facebook, something popped up recently that caught our particular attention. The threat, detected...
The most common malware technique for avoiding detection is to create loads of “fresh” variants. Actually, the component that changes so frequently...
...one Yasuhiro Kawaguchi was arrested yesterday on suspicion of "saving a virus on his computer," though the story suggests distribution of malware...
It's something of a truism, that 'old viruses never die', and that certainly seems to be the case for some of the...
In a ComputerWorld article Gregg Kaiser cites a Microsoft engineer as saying that the trojan that Microsoft calls “Popureb” digs so deeply...
Android Smartphones are under attack again by rogue applications that once installed are reading information from the phone and sending it back...
Security companies in general and, unfortunately, anti-malware companies in particular, are often accused of ‘hyping’ threats because of a perceived self-interest. However,...
Yesterday the U.S. president, Barak Obama, held a conference at the White House to announce that the leader of Al Qaeda, Osama...
Aryeh Goretsky posted a blog about a trojan program in a Microsoft catalog update. I thought it might be a little interesting...
UPDATE #1 Randy Abrams has posted a follow-up article, Anatomy of a Biting Bunny – The Infected Microsoft Catalog Update with additional information...
It is generally well-understood that antimalware programs—the software which detects computer viruses, worms, trojan horses and other threats to your system—work by...
Now that cyberwarfare is out of the bottle, will anyone agree to not use it? In the summer of 1945 in New...
In my ever-widening circle of anti-cybercrime methodology this particular approach to attribution of the criminals looting the free world makes me particularly...
“Written in the form of a personal retrospective, this paper compares the earliest days of PC computer viruses with today’s threats, as...
The attacks from cybercriminals are now occurring in the online stock and equity trading world. Instead of simply emptying out compromised brokerage...