Browsing Tag: malware

Categories: Vulnerabilities

[img_assist|nid=4368|title=|desc=|link=none|align=right|width=82|height=111]In a sudden about-face, Sun has rushed out a Java update to fix a drive-by download vulnerability that exposed Windows users to in-the-wild malware attacks.The patch comes less than a week after Sun told a Google researcher it did not consider the issue serious enough to warrant an out-of-cycle patch and less than a day after researchers spotted live exploits on a booby-trapped song lyrics Web site.

Read more...

[img_assist|nid=4354|title=|desc=|link=none|align=right|width=100|height=100]New research from Google underscores the breadth of fake antivirus operations on the Web. An analysis of 240 million Web pages collected by Google’s malware detection infrastructure over a 13-month period discovered more than 11,000 domains involved in the distribution of rogue antivirus (AV). Read the full article. [eWEEK]

Read more...

Categories: Malware

[img_assist|nid=4290|title=|desc=|link=none|align=left|width=100|height=100]Security researchers have identified a newly formed botnet that comprises machines infected with a Trojan specifically designed to manage the downloading and installation of a spectrum of other malicious software.

Read more...

[img_assist|nid=4265|title=|desc=|link=none|align=right|width=100|height=100]Malicious hackers have found a way to hijack WordPress database credentials and use that information to redirect thousands of blogs to Web sites laden with malware.The attacks, which started last Friday, occurred mostly on WordPress blogs hosted by Network Solutions but it appears that there are multiple security weaknesses in play.

Read more...

[img_assist|nid=4217|title=|desc=|link=none|align=right|width=100|height=100]A proposal to let Internet service providers conceal the contact
information for their business customers is drawing fire from a number
of experts in the security community, who say the change will make it
harder to mitigate the threat from spam and malicious software. Read the full article. [KrebsonSecurity]

Read more...

Categories: Malware

The attackers behind the raft of banker Trojans emanating from Brazil these days are continuing to refine their craft and learn new tricks. Their latest efforts have seen them going to greater lengths than ever to obfuscate their creations and hide their true functionality in order to evade detection and analysis by security software.

Read more...