Malware

Malware | News, how-tos, features, reviews, and videos

Hacked, unlocked, unsafe.

1,175 hotels listed in payment card breach of Holiday Inn parent company

InterContinental Hotels Group reported 1,175 IHG-branded hotels were involved in a payment card breach; the investigation is not complete, but so far 1,174 franchise hotels in the US are known to have had malware accessing payment...

frustrated computer user

New ransomware demanded high score on anime-style shooter game not bitcoins

No bitcoins? No problem for victims of Rensenware...just reach an astronomically high score in lunatic difficulty mode and encrypted files would be automatically decrypted.

hacking cybercrime cybersecurity internet coding programming code

Email-based attacks exploit unpatched vulnerability in Microsoft Word

Attackers for the past few months have been exploiting an unpatched vulnerability in Microsoft Word to compromise computers and infect them with malware.

Windows security holes

Word zero-day affects all versions of Office and Windows

Some say McAfee violated 'responsible disclosure' norms when it rushed to disclose the exploit ahead of Microsoft's fix

21394517746 9a77570fae o

WikiLeaks: CIA used bits of Carberp Trojan code for malware deployment

When the source code to suspected Russian-made malware leaked online in 2013, guess who used it? A new release from WikiLeaks claims the CIA borrowed some of the code to bolster its own hacking operations.

security code big data cyberespionage byte

IoT malware begins to show destructive behavior

Hackers have started adding data-wiping routines to malware that's designed to infect internet-of-things and other embedded devices.

Digital Key encryption

A free decryption tool is now available for all Bart ransomware versions

Antivirus vendor Bitdefender has released a free decryption tool that works for any files affected by the Bart ransomware.

Android Google marshmallow

Notorious iOS spyware, Pegasus, has an Android sibling

Security researchers have uncovered the Android version of an iOS spyware known as Pegasus in a case that shows how targeted electronic surveillance can be.

Security

UEFI flaws can be exploited to install highly persistent ransomware

A team of researchers from security vendor Cylance demonstrated a proof-of-concept ransomware program that ran inside a motherboard's Unified Extensible Firmware Interface (UEFI).

21394517746 9a77570fae o

Latest WikiLeaks dump exposes CIA methods to mask malware

WikiLeaks may have dealt another blow to the CIA’s hacking operations by releasing files that allegedly show how the agency was masking its malware attacks.

code programming software bugs cybersecurity

Open-source developers targeted in sophisticated malware attack

Developers who publish their code on GitHub have been targeted in an attack campaign that uses a little known but potent cyberespionage malware.

euro bills

Trojan source code leak poised to spur new online banking attacks

The source code for a new banking Trojan has been published online, offering an easy way for unskilled cybercriminals to launch potent malware attacks against users.

cyberattack

New Mirai IoT variant launched 54-hour DDoS attack against a U.S. college

Researchers have spotted a new Mirai variant in the wild that is better at launching application layer attacks; other researchers spotted a new Cerber ransomware variant that can evade machine learning.

woman on tablet with broken lock

Password-stealing flaws in LastPass Chrome and Firefox extensions

Critical vulnerabilities in the Chrome extension and Firefox add-on for LastPass could be exploited to steal passwords and remotely execute code.

security hacker privacy

String of fileless malware attacks possibly tied to single hacker group

Several attacks observed over the past few months that rely heavily on PowerShell, open-source tools and fileless malware techniques, might be the work of a single group of hackers.

petya ransomware logo

Hackers use dangerous Petya ransomware in targeted attacks

A group of attackers has found a way to hijack the Petya ransomware and use it in targeted attacks against companies without the program creators' knowledge.

Android devices coming with preinstalled malware

Android devices were infected with malware at some point after leaving the manufacturers, but before landing in the hands of companies' employees.

Security

After CIA leak, Intel Security releases detection tool for EFI rootkits

Intel Security has released a tool that allows users to check if their computer's low-level system firmware has been modified and contains unauthorized code.

screen shot 2017 03 09 at 9.58.02 am

Assange: CIA had lost control of its cyberweapon documents

Information about purported CIA cyberattacks was "passed around" among members of the U.S. intelligence community and contractors before it was published by WikiLeaks this week, Julian Assange says.

hacker, hackers, hacking

Leaked docs suggest NSA and CIA behind Equation cyberespionage group

Purported CIA documents leaked Tuesday appear to confirm that the U.S. National Security Agency and one of the CIA's own divisions were responsible for the malware tools and operations attributed to a group that security researchers...

Load More
Recommended for You