Malware & Vulnerabilities

Malware and vulnerabilities news, trends, analysis and practical advice

gottfried leibbrandt ceo swift sibos 2016
sofacy 1

texting woman iphone macbook

iOS 10 backups are easier to crack, but Apple promises to fix security flaw

Forensic researcher claims iOS 10 local backups are easier to crack due to a hashing algorithm that is 2,500 times weaker than in iOS 9; Apple confirmed the security flaw and promised to roll out a patch.

hacker

Hackers sell tool to spread malware through torrent files

Be careful with what you torrent. A new tool on the black market is helping hackers distribute malware through torrent files in exchange for a fee.

swift security breaches

Swift hopes daily reporting will help stem payment fraud

Swift is introducing a new reporting system to help banks identify fraudulent payments made over its financial transfer network -- but the reports will arrive up to a day too late to stop them all.

row of colorful euros currency

Thousands of Seagate NAS boxes host cryptocurrency mining malware

Thousands of publicly accessible FTP servers, including many Seagate network-attached storage devices, are being used by criminals to host malware that mines cryptocurrency.

4120913056 d1931898b4 o

Crafty GovRAT malware targets U.S. gov't employees

A tough-to-detect malware that attacks government and corporate computers has been upgraded, making it more aggressive in its mission to steal sensitive files, according to security firm InfoArmor.

bernard barbier

Yes, U.S. did hack Elysée Palace in 2012, French ex-spy claims

Bernard Barbier, a former head of the French signals intelligence service, shared a few stories with students of CentraleSupélec, the elite engineering school from which he graduated in 1976, at a symposium this summer.

malware attack cyberespionage code hacker

Stealthy, sneaky rootkit targets Linux systems on ARM and x86

Security researchers have identified a new family of Linux rootkits that despite running from user mode, can be hard to detect and remove.

code big data binary programming

Sophos' false positive ruins the weekend for some Windows users

A bad malware signature caused Sophos antivirus products to detect a critical Windows file as malicious, preventing some users from accessing their computers.

bubble man data shield attack binary code

Review: SentinelOne blocks and dissects threats

SentinelOne EPP brings good malware detection, excellent forensics and flexible remediation to business networks.

OS X El Capitan installation

BitTorrent client is found distributing Mac-based malware

A popular BitTorrent client called Transmission has again been found distributing Mac-based malware, months after it was used to spread a strand of ransomware.

security code big data cyberespionage DDoS

Attackers use rogue proxies to hijack HTTPS traffic

A new attack analyzed by malware researchers from Microsoft uses Word documents with malicious code that configures browsers to use a web proxy controlled by attackers.

Digital Key, security, encryption

New ransomware threat deletes files from Linux web servers

A destructive ransomware program deletes files from web servers and asks administrators for money to return them, though it's not clear if attackers can actually deliver on this promise.

fbi badge and gun

Two state election systems attacked, FBI suspects ‘foreign hackers’

FBI warned of two state election systems being attacked, Illinois and Arizona, and advised states to search for similar 'foreign hacker' activity in their logs.

malware payment terminal credit card

Sophisticated malware possibly tied to recent ATM heists in Thailand

Security researchers have found a sophisticated malware program that may have been used recently by a gang of hackers to steal more than $350,000 from ATMs in Thailand.

snow globe security

Despite billions spent on cybersecurity, companies aren’t truly safe from hacks

Last year, private-sector companies globally spent more than $75 billion on security software to safeguard their systems and data. Has all that spending made private sector data and systems any safer?

wikileaks

Malware alert: Dump on WikiLeaks contained over 3,000 malicious files

Malware expert Vesselin Bontchev discovered 323 malware instances in his first scan of WikiLeaks' email dump from Turkey’s ruling political party; he listed 3,277 in his second report. WikiLeaks quietly 'neutered' some of the malware....

Malware steals payment card data from PoS

Eddie Bauer is latest retailer to be hit by point-of-sale malware

Sportswear retailer Eddie Bauer informed customers that point-of-sale systems at its stores were hit by malware, enabling the theft of payment card information.

id 2958269 150515 nsa sign 100601668 orig

The NSA's hoard of cyber weapons makes some experts nervous

The disclosure this week of a cache of files supposedly stolen from the National Security Agency has put a spotlight on secret cyber weapons the NSA has been holding -- and whether they should be disclosed.

Load More