Huge threats still targeting power grids
One year ago, the Stuxnet virus had just been discovered. A year’s worth of analysis still has not unlocked its secrets but it has had a profound influence upon the …
Symantec tackles malicious advertising
Symantec announced AdVantage, a new cloud-based service that will enable website owners to discover malware hidden in online advertisements. Malicious advertising …
How the German “Federal Trojan” was actually used
After the Chaos Computer Club hackers made public the results of their analysis of a few samples of the so-called “Federal Trojan” and found it capable of more …
Trojanized Netflix app steals account login credentials
When Netflix released an Android client app earlier this year, it also witnessed the attempts of various app developers who tried to make a pirated copy of it work on other …
Enhanced automated malware analysis by RSA
RSA announced new capabilities for RSA NetWitness Spectrum, an analytical workbench for the identification, analysis and prioritization of malware-based threats to enterprise …
Fake virus warning from company IT department brings real malware
Emails purportedly coming from a company’s IT department has been spotted targeting users of various big companies and trying to make them download malware for the last …
Don’t worry about zero-days, says Microsoft
Microsoft released its Security Intelligence Report volume 11 (SIRv11), which found that less than 1 percent of exploits in the first half of 2011 were against zero-day …
Best practices for reporting malware
Nonprofit anti-malware organization StopBadware released of its new Best Practices for Reporting Badware URLs, which prescribe specific steps for reporting different types of …
U.S. military drones hit by computer virus
An unnamed virus with a “keylogger” payload has been found in the computers used to operate U.S. Air Force’s Predator and Reaper remotely operated drones. …
Virus Bulletin news tweets spread malware
Malware peddlers are known for using news of unfolding events as lures to trick curious users into clicking on an offered malicious link. This practice is most often seen on …
Government telecommunication-spying malware opens backdoor
The Chaos Computer Club claims that a government-made “lawful interception” Trojan has abilities that exceed those allowed by the nation’s legislature and …
Malware attacks up due to social media
63 percent of more than 4,000 respondents in a new Ponemon Institute survey said that social media in the workplace represents a serious security risk — yet only 29 percent …