Please turn on your JavaScript for this page to function normally.
binary bomb
Malware hidden in digitally signed executables can bypass AV protection

Researchers have shown that it’s possible to hide malicious code in digitally signed executables without invalidating the certificate, and execute this code – all …

code
Flawed code hooking engines open endpoints to compromise

Six common security issues stemming from the incorrect implementation of code hooking and injection techniques have been unearthed by EnSilo researchers in over 15 different …

anti-ransomware
Researchers create effective anti-ransomware solution

Are you willing to sacrifice a dozen or so of your files in order to save the rest from the grasping hands of modern crypto-ransomware? I believe that the answer from most …

Symantec
Symantec, Norton AV products are riddled with serious flaws

Google security researcher Tavis Ormandy has unearthed a slew of critical vulnerabilities, including many remote code execution flaws, in Symantec and Norton enterprise and …

Symantec
Bug in Symantec’s anti-virus engine can lead to system compromise

Google Project Zero researcher Tavis Ormandy has unearthed a critical remote code execution vulnerability in the anti-virus engine powering Symantec’s endpoint security …

Bug
Google researchers finds critical flaws in Trend Micro AV solution

If you are using Trend Micro’s Maximum Security 10 solution for Windows, you might want to update it to the latest available version as soon as possible. If you …

List of approved Windows 10 compatible security products

Windows 10 is now available to users around the world, and it comes with new security features.AV-Comparatives tested a variety of software titles to see which of them are …

Finally! A free, open source, on-premise virus scanner framework

After having spoken about it for quite a while, security researcher Robert Simmons has finally begun publishing the code and documentation of his open source AV scanner …

Confidence in antivirus falls to all-time low

While concern for end-user risk persists, confidence is waning in traditional detection-based security solutions, such as antivirus and firewalls. Instead, interest is …

US, UK spies reverse-engineered security software in search for flaws

The UK GCHQ has been actively trying to reverse-engineer popular security software in order find vulnerabilities that can be used to neutralize the protection the software …

New infostealer tries to foil analysis attempts by wiping hard drive

“Cisco researchers have discovered a new information-stealing Trojan that reads and records any plain-text data the victim types into their browser. But this discovery …

Signature antivirus’ dirty little secret

If you rely only on traditional, signature-based antivirus, you are going to get infected—and probably a lot! Antivirus was, and still is, a valuable addition to your layered …

Don't miss

Cybersecurity news