Tag Archives: Malware

Five Habits Of Highly Successful Malware

Source: Dark Reading by Robert Lemos “The Internet frequently represents evolution on steroids, and the malware ecosystem is no different. Malware has quickly evolved to take advantage of weaknesses in digital defenses. In 2012, more than 40 million Windows systems were infected with malware, according to data collected by Microsoft in its annual Security Intelligence Report. And Google… Read More »

Android Malware: Breaking New Ground and Old Taboos

Source: F-Secure “Last Thursday’s post links to “Stels” analysis by Dell SecureWorks. (Read it!) Stels is a versatile Android trojan which has recently started spreading via the Cutwail spam botnet. Android malware being distributed by a mass-market crimeware gang — could be a game changer. So, how did Stels spread before Cutwail? Here’s a few slightly older Stels… Read More »

Thousands of compromised Apache servers direct users to malware

Source: Help Net Security “What do the recent compromises of a number of LA Times websites and the blog of hard disk drive manufacturer Seagate have in common? According to several security researchers, all these sites are hosted on servers running Apache web server software, and have been compromised and equipped with module that is able to insert… Read More »

Malware pushers poison MSN Messenger search results

Source: Help Net Security by Zeljka Aorz “As the date when the MSN Messenger is scheduled to be phased out speedily approaches, it is getting harder to find an installer for it online, so malware peddlers gave rushed in to fill the vacuum, warns Kaspersky Lab’s Fabio Assolini. The doomed IM client is especially popular in Brazil –… Read More »

Banking malware returns to basics, researchers say

Source: Computerworld “Financial malware authors are trying to evade new online banking security systems by returning to more traditional phishing-like credential stealing techniques, according to researchers from security firm Trusteer. Most financial Trojan programs used by cybercriminals today are capable of tampering in real time with online banking sessions initiated by victims on their computers. This includes the… Read More »