Malware & Vulnerabilities

Malware and vulnerabilities news, trends, analysis and practical advice

20160225 stock mwc ericsson booth security locks
Android N statue

hacker attack

Millions of routers allegedly backdoored with malware that can’t be removed

One of the hackers purportedly responsible for a zombie army of Mirai-infected IoT devices, claimed he have infected millions of routers with malicious firmware which can't be removed; a victim's only recourse is to trash the router.

sony sncxm631

Backdoor accounts found in 80 Sony IP security camera models

Many network security cameras made by Sony could be taken over by hackers and infected with botnet malware if their firmware is not updated to the latest version.

pc antivirus digital display

Is antivirus software dead at last?

The debate about whether antivirus software is still useful has been going on for a few years now. This technology was once the mainstay of the security efforts for most businesses and home users. The challenge of late is the ability...

hacker, DDOS, IoT, SkilledAnalysts

New botnet launching daily massive DDoS attacks

CloudFlare spotted a new botnet in the wild which launched massive DDoS attacks aimed at the US West Coast for 10 days in a row.

malware attack cyberespionage code hacker

Data-wiping malware strikes Saudi government agencies

Saudia Arabia’s government agencies were hit with a cyberattack that security researchers are blaming on a worm-like malware that can wipe computer systems, destroying data.

tor

Firefox zero-day can be used to unmask Tor browser users

The exploit code is reportedly a near match to the code used by the FBI in 2013 to deanonymize Tor users; Mozilla is aware of the zero-day and is working on a fix.

malware attack cyberespionage code hacker

San Francisco Muni says server data not accessed in ransomware hit

The San Francisco Municipal Transportation Agency said late Monday that no data had been accessed from its servers in a ransomware attack on the Muni transit system and the agency has never considered paying the ransom asked by the...

ransomware man pointing gun out of computer security

Was software piracy behind the San Francisco Muni transit system ransomware infection?

The attacker claimed the ransomware was an automated attack which was triggered via a software keycode generator torrent file downloaded by someone at SFMTA.

hacker, hack, hacking

San Francisco’s Muni transit system reportedly hit by ransomware

San Francisco’s Muni transit system was reportedly hit by ransomware on Friday, leading to the message “You Hacked, ALL Data Encrypted” being displayed on the computer screens at stations, according to newspaper reports.

online security hacker

3 security reports about shopping online for Black Friday and Cyber Monday

Amazon and Walmart listed among the “least secure” online retailers; popular WordPress e-commerce plugins have severe vulnerabilities; spammy scammers again cashing in on store brands and “Black Friday.”

ransomware locked laptop

Half of surveyed U.S. businesses admitted to suffering a ransomware attack

Of the companies surveyed worldwide, 85% admitted to suffering from 3 or more attacks in a year, with six being the global average of ransomware attacks.

hack hacker hacked

Hacker can backdoor your computer and router in 30 seconds with $5 PoisonTap device

Samy Kamkar’s PoisonTap can leave a remotely accessible backdoor on your computer and router.

security code big data cyberespionage byte

New method could let Windows malware bypass detection

Security researchers have discovered a new way that allows malware to inject malicious code into other processes without being detected by antivirus programs and other endpoint security systems.

locks

Can you really stop ransomware?

Stopping ransomware from accessing your files by using whitelisting.

Security (3)

Free tool protects PCs from master boot record attacks

A new open-source tool called MBRFilter can protect the master boot record of Windows computers from modification by ransomware and other malicious attacks.

security code big data cyberespionage DDoS

Hackers create more IoT botnets with Mirai source code

Malware that can build botnets out of IoT products has gone on to infect twice as many devices after its source code was publicly released.

malware payment terminal credit card

Hackers hide stolen payment card data inside website product images

Attackers compromise online shops and store stolen payment card details inside legitimate image files in order to avoid detection.

malware payment terminal credit card

Dyre banking Trojan successor rears its ugly head

Cybercriminals have unleashed a new banking Trojan on the internet and it bears striking similarities to Dyre, a malware threat believed to be dead for almost a year.

Load More