Please turn on your JavaScript for this page to function normally.
Malware analysis: Collaboration, automation and training

Whether you’re a novice or a professional at analyzing malicious code, you’ll have a desire to learn or pass on that skill. Most malicious code analysis is …

Activists now targeted with trojanized backdoor apps

Phishing emails targeting Tibetan and Uyghur activists and containing spying malware masquerading as legitimate DOC and PDF files are nothing new, as such spam campaigns have …

Real-time apps and FTP are preferred malware targets

Palo Alto Networks published an analysis of new and evasive malware in live enterprise networks. Their findings show that traditional antivirus solutions are not identifying …

Fake BBC emails lead to Blackhole, Zeus

Spam emails supposedly coming from CNN and the BBC and delivering links to trending news stories have once again become the preferred way for malware peddlers to lure …

Malware pushers poison MSN Messenger search results

As the date when the MSN Messenger is scheduled to be phased out speedily approaches, it is getting harder to find an installer for it online, so malware peddlers gave rushed …

Beware of fake Candy Crush apps on Google Play

Whenever a mobile game becomes hugely popular, it also becomes a great way for scammers and malware peddlers to lure users into unknowingly installing malicious apps on their …

Becoming a malware analyst

There are few jobs in this industry that seem as appealing and interesting to me as that of a malware analyst. In my mind, these professionals were waking up each day to …

Free Android malware analysis tool

Bluebox Labs announced Dexter, a free tool to help researchers and enterprise security teams analyze applications for malware and vulnerabilities. The Dexter platform provides …

Virtual classroom for incident response

To provide digital investigators and other incident responders the tools and skills to detect and respond to targeted attacks, HBGary announced a series of new live online …

New ZeuS-based modular rootkit offered to cybercriminals

Given the popularity of the Zeus crimeware, and the fact that its source code has been ultimately offered for sale at bargain basement prices, it’s no wonder that every …

Seagate blog compromised, leads to Blackhole and malware

A blog of well-known hard disk drive manufacturer Seagate has been compromised to contain malicious iFrame injections that redirect users to websites hosting the Blackhole …

Encrypting Trojan targets users, demands $5,000

Russian anti-virus company Doctor Web is warning users of an active ransomware campaign executed through brute force attack via the RDP protocol on target machines. Once …

Don't miss

Cybersecurity news