Please turn on your JavaScript for this page to function normally.
Video: Antivirus evasion techniques

This video from DerbyCon discusses the basics of the AV evasion problem, what techniques work, which ones don’t and why. The talk has a particular focus on AV evasion as …

Yara rules for leaked KINS toolkit

Just a few days ago, the source code of the famous KINS banking Trojan was leaked. KINS aims to infect as much computers as possible in order to steal credit cards, bank …

Bogus Facebook login page steals credentials, pushes malware

Symantec researchers have recently stumbled upon a phishing site that packs a double whammy: the site asks the user either to log into Facebook or to download an app in order …

Blackhole exploit kit creator arrested

It has been confirmed: the author of Blackhole, the most popular exploit kit out there, has been arrested by Russian authorities. The news that the malware creator that goes …

Webroot delivers data, identity and threat protection

Webroot released the latest updates to its Webroot SecureAnywhere portfolio. The latest release brings new detection technology to block emerging malware and phishing attacks …

Vulnerable and aggressive adware threatening millions

FireEye discovered a new mobile threat from a popular ad library that no other antivirus or security vendor has reported publicly before. Mobile ad libraries are third-party …

McAfee solution remediates advanced malware

McAfee announced an end-to-end solution to help organizations combat the increasing challenges of advanced malware. McAfee goes beyond single-feature, static analysis …

Portable USB drive fixes malware-crippled machines

Malwarebytes launched Techbench, a tool to help IT workers fix and restore even the most malware-infected computers. The 16GB USB simply needs to be plugged into the infected …

Researchers sinkhole half a million ZeroAccess bots

In a race against time and ZeroAccess developers and botmasters, Symantec researchers managed to sinkhole a large chunk of the infamous P2P-based botnet before its herders …

Tor-using Mevade botnet is stealthy new version of old threat

The Mevade Trojan and botnet have gained unexpected notoriety when it turned out that the majority of the recent, sudden and massive uptick in Tor users was the result of it …

Cybercriminals exploit most news within 22 hours

Cybercriminals continue to respond with lightning speed when they see an opportunity to exploit a national or global news story to spread malware. In fact criminals are …

Icefog cyber espionage campaign exposed

Kaspersky Lab’s security research team discovered Icefog, a small yet energetic Advanced Persistent Threat (APT) group that focuses on targets in South Korea and Japan, …

Don't miss

Cybersecurity news