Items tagged with Malware

Nobody wants to rack up bad karma, which should be reason alone not to pilfer movies from the internet via BitTorrent or whatever other means. But even disregarding the moral aspect or pirating movies and games, there's another reason not to engage in such behavior—you could end up with a malware infection. Some... Read more...
One app on the Google Play store has sent users’ contacts to a Russian server on the sly. Then, it signed them up for expensive subscriptions. That one app has already been downloaded half a million times. If you’re among those 500,000 users who downloaded the app, you’d best delete it now. The app is called Color... Read more...
Criminal ransomware distributors have evolved dramatically over the past few years. Operators that were once splinter groups or lone individuals have become highly sophisticated and organized. Security experts say it’s not getting any better, either. Rather, some say we’re in the “golden era of ransomware” and 2022... Read more...
Installing pirated software is always risky business. The hacking tools used to bypass legitimate software activation quite frequently include viruses and malware. The latest in a long line of malware piggybacking is a popular activation tool that targets your cryptocurrency wallets. The threat was first noticed by... Read more...
An Android malware analyst at Kaspersky continues to expose apps in Google play that may appear legitimate at first glance, but actually have a sinister underside. Each of the nearly two dozen apps (so far) identified since late July contain a Joker trojan, which itself features a bag of devious tricks to swindle... Read more...
This weekend, cyber-security firm Palo Alto Networks released a detailed analysis of an ongoing hacking campaign targeting technology, defense, healthcare, energy, and education industries. The attack targets Zoho's ManageEngine ADSelfService Plus password management system and uses vulnerability CVE-2021-40539 to... Read more...
If you were a threat actor, what better way to get a payload onto someone’s device than through a program that nearly everyone has installed like Google Chrome? Unfortunately, this appears to be what is happening with the Infostealer malware, masquerading as a legitimate update to the popular web browser from Google... Read more...
Malware on Windows devices has become a real problem in the last few years, specifically with a recent uptick in ransomware. It appears that Microsoft has been trying to combat this issue, though, with updates to Microsoft Defender, so it has more teeth than ever before. However, what if Microsoft is part of the... Read more...
A lot of folks buying (legitimate) software are disgruntled about the rise of "software as a service," or SaaS. Proponents claim that the continued payments enable further development of useful applications, while opponents complain that they end up paying far more than they might under a more traditional "buy to own"... Read more...
Practically everyone owns a mobile device these days, and the majority of them run on Android, the most popular smartphone OS in the world. Don't think that malicious hackers aren't paying attention. Just the opposite, a security firm says it recently discovered an "aggressive mobile premium services campaign" that... Read more...
Security researchers say they discovered and reported to Microsoft a "highly sophisticated" zero-day attack vector in Windows that targets Office 365 and Office 2019 users. In some cases, simply opening an infected document would be enough to compromise a PC. Furthermore, there does not yet exist a patch, though one... Read more...
A notorious cyber-criminal group is believed to be responsible for a malicious Word document that attempts to lure victims by preying on their curiosity towards Windows 11, the next major operating system from Microsoft. The document began making the rounds in June, the same month a leaked Windows 11 ISO tipped up... Read more...
Do you ever feel like the universe just has it in for you? Adding to the theory that some entity is pulling the strings from behind the scenes and having a good chuckle at our expense, not only are graphics cards frustratingly almost always out of stock (and overpriced), but if you do manage to procure one, you may... Read more...
It is somewhat common for enterprising developers to add features to popular apps via plug-ins, companion apps, or even by modifying the original when possible. By reverse-engineering apps, like WhatsApp for example, a skilled developer can tweak and modify features or even add their own spin on things. However, this... Read more...
Not everything has to be high-tech to perform dastardly deeds these days, and the same is true of malware. However, malware can slip by conventional security solutions using some email tricks and social engineering and still infect end-users, as Microsoft reports. This Tuesday, the Microsoft Security Intelligence... Read more...
Network Attached Storage (NAS) devices from Synology are being targeted by the StealthWorker Botnet in an ongoing brute-force attack that could lead to ransomware infections. Perhaps we should just drop the “network attached” of NAS portion for now. According to an August 4th report, Synology’s Product Security... Read more...
Some of Gigabyte's support sites have been taken offline, the result of an apparent ransomware attack in which a hacking group claims to be in possession of sensitive data, and is holding it hostage. If a ransom is not paid, the culprits say they will publish 112 gigabytes of stolen files, including ones containing... Read more...
Some vultures prey on dead animals, other Vulturs prey on banking information entered on Android devices. In late March of this year, ThreatFabric detected an Android-based remote access trojan (RAT) malware, dubbed Vultur, collecting login credentials. However, the threat actors took a different approach to the... Read more...
Microsoft's Windows 11 operating system is set to debut this October, and understandably, many people are excited about its launch. After all, it's been about six years since the official launch of Windows 10, and people are antsy to see what's next from Microsoft. Unfortunately, scammers are always looking for a way... Read more...
Over the past few years, the surge in cryptocurrency values has meant that unscrupulous individuals are looking for ways to make money without putting in the hard work. In the case of cryptocurrency malware, the software is installed on unsuspecting computers, forcing them to mine without the victim seeing a single... Read more...
High-reward ransomware appears to be all the rage right now after the REvil hacking group executed the Kaseya attack, encrypting over 1,500 businesses. Now, Saudi Aramco has confirmed a data leak today following an extortionist who demanded $50 million after claiming to have sized a large quantity of data from the... Read more...
Though notorious hacking group REvil has gone offline, companies are still reeling from the effects of the Kaseya ransomware attack. However, it seems the Florida-based remote-management software company has obtained a universal decryptor key and is working with all its customers to rectify the situation. Just before... Read more...
Prev 1 2 3 4 5 Next ... Last