Skip to main content

Viruses & Malware

Malware's invisibility is its best weapon, Trend Micro exec says

posted onMay 19, 2013
by l33tdawg

 The problem with sophisticated malware is that it tries to be invisible and persistent for as long as possible, according to Trend Micro global chief technology officer, Raimund Genes.

To back up his claim, Genes points to a report from Trustwave that sets the average time from the infiltration and breach of corporate resources until detection at 210 days or longer.

BadNews Android apps spread SMS trojan

posted onApril 23, 2013
by l33tdawg

Researchers have discovered a new family of malware that found its way into legitimate apps inside Google's official store thanks to a malicious advertising network.

The malware was detected in 32 apps across four different developer accounts in Google Play and was downloaded up to nine million times, according to Lookout researchers who dubbed the malware BadNews.

Just how much malware is on free porn sites?

posted onApril 17, 2013
by l33tdawg

Did you know the Internet has pornography on it? We were just as shocked to discover that as you. In fact, much of this pornographic material is available for free—but that doesn’t mean there’s not a huge potential cost. Specifically when it comes to malware. One researcher found that among some of world’s most highly trafficked free pornography sites, the probability of coming into contact with malware can exceed 50 percent in some cases.

Bitcoin-mining malware enslaves computers

posted onApril 5, 2013
by l33tdawg

Dumb-as-a-post Bitcoin-mining malware has appeared – bringing further proof that the virtual currency's hyperbolic trajectory is attracting the sort of late-to-the-party shady speculator that telegraphs a jarring fall.

The malware is currently spreading through a wide-ranging link poisoning campaign being run on Skype, a Kaspersky researcher wrote on Thursday. It is not the first Bitcoin-mining malware that has been detected, but its arrival coincides with a period of intense interest in the currency.

Evernote account used to deliver instructions to malware

posted onMarch 29, 2013
by l33tdawg

A piece of malicious software spotted by Trend Micro uses the note-taking service Evernote as a place to pick up new instructions.

The malware is a backdoor, or a kind of software that allows an attacker to execute various actions on a hacked computer. Trend Micro found it tries to connect to Evernote in order to obtain new commands.

IT Concerns About Targeted Malware Rising

posted onMarch 29, 2013
by l33tdawg

When it comes to servers, IT and security professionals' concerns about targeted malware and data breaches are escalating while their confidence in their ability to identify and stop advanced threats is on the decline, according to a new survey by security firm Bit9.

"Targeted malware was the top security concern for the second year in a row," says Ilana Goddess, product marketing manager for Bit9, noting that 52.4 percent of survey respondents (up 15 percent from a year ago), cite targeted malware as their primary concern.

Malware-detecting 'sandboxing' technology no silver bullet

posted onMarch 27, 2013
by l33tdawg

The security technology called "sandboxing" aims at detecting malware code by subjecting it to run in a computer-based system of one type of another to analyze it for behavior and traits indicative of malware. Sandboxing -- one alternative to traditional signature-based malware defense -- is seen as a way to spot zero-day malware and stealthy attacks in particular. While this technique often effective, it's hardly foolproof, warns a security researcher who helped establish the sandboxing technology used by startup Lastline.

Network security study reveals 26,000 undetected malware samples

posted onMarch 27, 2013
by l33tdawg

A two-month study has identified 26,000 unique malware samples that were completely undetected by existing anti-virus solutions.

The study by Palo Alto Networks found that web-based malware stays hidden for an average of 20 days before being detected, as opposed to five days for email-based malware, while 94 per cent of the undetected malware was delivered via web browsing or web proxies.