The general population may have had its fill of Facebook at this point, but attackers sure haven’t. There is a new round of Facebook-related spam that is using fake messages about recent crimes involving recipients’ friends as a lure to direct them to Tumblr pages serving exploits. The campaign comprises several different individual messages purporting[...]
Browsing Tag: malware
Researchers at Kaspersky Lab have spotted a 64-bit version of the Zeus banking Trojan. The malware adds a new wrinkle to its capabilities in that it communicates stolen credentials and other data over Tor.
Mozilla has released a major new version of Firefox, which includes fixes for more than a dozen security vulnerabilities as well as an important change that makes all Java plugins click-to-play be default. This feature prevents those plugins from running automatically on Web pages, which helps protect users against some Web-based attacks.
Microsoft’s takedown of the ZeroAccess botnet wasn’t a complete success. Experts point out that Microsoft targeted only the money-making aspects of the botnet, and that its communication protocol was untouched.
As 2013 comes to a close, security experts are looking back at the major stories and developments of the year, including the Edward Snowden NSA leaks and major malware attacks. In this video, Vitaly Kamluk of Kaspersky Lab examines the biggest security news of 2013 and talks about the lasting effects they may have.
Arbor Networks researchers report the discovery of two servers hosting Dexter and Project Hook point of sale malware.
A Pony botnet controller has been discovered with two million stolen credentials, most of them for online services from Facebook, Twitter, Yahoo, Google and the ADP payroll service.
German scientists have come up with a way of transmitting small bits data, such as passwords, over an acoustical mesh network between air-gapped computers.
The researchers who discovered a serious vulnerability in Android 4.3 Jelly Bean that enables a malicious app to disable the security locks on a vulnerable device have published a proof-of-concept app that exploits the bug, as well as source code for the app.
A researcher may have found the quickest route to learning which files are encrypted in CryptoLocker ransomware infections.