Microsoft security products will begin detecting software containing search protection functions and classifying it as malicious on June 1.
Browsing Category: Malware
Nitlove and several new versions of PoSeidon can be added to the growing heap of point-of-sale (POS) malware discovered this year.
Experts point out that the proposed Wassenaar rules in the U.S. leave unanswered questions regarding exploit development and the use of commercial penetration testing tools.
The Commerce Department’s Bureau of Industry and Security today made public its proposal to implement the controversial Wassenaar Arrangement.
The so-called Deputy Dog APT group has surfaced again with a means of keeping its command and control servers under wraps that involves Microsoft’s TechNet online resources.
Penn State announced that its school of engineering was the victim of a more than two-year long cyberattack perpetuated by advanced persistent threat groups.
The attackers behind the TeslaCrypt ransomware, which is one of the newer entries on the scene, may not be making as much money yet as some of their more experienced competitors, but researchers say that their malware is having a profound effect on victims. Like many other pieces of ransomware, TeslaCrypt often spreads with the[…]
Google is rolling out a new policy that will force all Windows and Mac users to install Chrome extensions only from the Chrome Web store. The company last year began enforcing this policy for Windows users on the main, stable channel for Chrome. Google offers several different channels for Chrome users, depending upon their tolerance[…]
It’s been a couple of months since we left our heroes on CSI: Cyber, and boy, have they been busy.
The Angler exploit kit is pushing yet another new variant of the TeslaCrypt and AlphaCrypt ransomware. It is similar to Cryptolocker but remains unnamed.