Tag Archives: malware

(Code) Size Doesn’t Matter: Happy Easter and Enjoy Some Brilliant Computer Art

One thing that disturbs me is how people classify some malware by how surprising large the file is, how many libraries it uses, etc. In many cases, this just means the malware has inefficient code and all the tools are available to easily convert the binaries back into human-readable pseudocode. Let’s look back a bit Read more…

Targeted Attacks the Next Step in Mobile Malware

The Android threat landscape continues to evolve in 2013. To distribute Android threats, malware authors are transitioning away from attacking traditional vectors like the Google Play Market and third-party Android markets to vectors like spam and phishing emails and SMS. Recently a new information-stealing Android malware was found being distributed as an attachment in emails Read more…

Botnets Remain a Leading Threat

      No Comments on Botnets Remain a Leading Threat

One threat has evolved and dominated the threats landscape like no other: botnets. Practically every day a new set of online criminals attempt to exploit users in some way or the other. The best way to stop this threat at the perimeter is to identify its communication channel and block the bot from connecting to Read more…

Botnets Remain a Leading Threat

      No Comments on Botnets Remain a Leading Threat

One threat has evolved and dominated the threats landscape like no other: botnets. Practically every day a new set of online criminals attempt to exploit users in some way or the other. The best way to stop this threat at the perimeter is to identify its communication channel and block the bot from connecting to Read more…

South Korean Banks, Media Companies Targeted by Destructive Malware

A massive computer shutdown of two South Korean banks and media companies occurred Wednesday via an Internet malware attack. The malware wiped out the master boot records on the hard drives of the infected computers, overwriting the MBR with either one of these strings: PRINCPES PR!NCPES HASTATI. Figure 1: Snapshot of MBR after infection. The Read more…

Citadel Malware Continues to Deliver Reveton Ransomware in Attempts to Extort Money

A new extortion technique is being deployed by cyber criminals using the Citadel malware platform to deliver Reveton ransomware. The latest version of the ransomware uses the name of the Internet Crime Complaint Center to frighten victims into sending money to the perpetrators. In addition to instilling a fear of… Read more »

Travnet Trojan Could Be Part of APT Campaign

Attackers use all kinds of attack vectors to steal sensitive information from their targets. Their efforts are not limited to only zero-day vulnerabilities. Malware authors often exploit old vulnerabilities because a large number of organizations still use old vulnerable software. The Trojan Travnet, which steals information, is a classic example of malware that takes advantage Read more…

Oops – Have You Forgotten to Secure Your Devices?

Isn’t Christmas and the school holidays a whirlwind? Between holiday ‘catch-ups’, the very intense family schedule and New Year’s celebrations, it can be a wonderful yet often exhausting time. Sometime it is hard to find a moment to think! But now school has begun and the dust has settled. Phew! So, I have to ask Read more…

Happy Birthday Internet – What Are the Challenges Security Experts Predict For the Future?

The Lady has just turned 30. But she isn’t ready to leave the limelight yet, for she is still evolving, still acquiring large number of admirers daily. No wonder that over 2.4 billion people across the world are her diehard users today, according to Internet World statistics. Wondering who she is? She is the wonder Read more…

Shady Surfing: Online Ads 182x More Likely than Adult Websites to Infect Your PC

Wait…what! You heard it right: According to a recent security report, Internet users are 182 times more likely to get a virus from clicking on online ads than visiting an adult website. At first glance, this sounds extremely counterintuitive (and it is). In theory, wouldn’t your risk go up when visiting shady sites? Yes and Read more…