Items tagged with Malware

In February security firms, researchers, infosec employees, antivirus, and malware organizations rejoiced. Why? Microsoft was finally disabling Visual Basic for Applications (VBA) macros on Microsoft Office. However, the Redmond software giant just took a step back and reversed course on the change, but why? What... Read more...
Security researchers say they've uncovered a sneaky new malware strain that may go undetected by virtually all antivirus scanners on the market. While they have not tested each and every one of them in existence, they did upload the sample to VirusTotal and all 56 AV scanners on the site failed to detect a malicious... Read more...
Last month, we wrote about malicious Android apps containing a trojan that researchers have dubbed “SMSFactory.” This bit of malware exists to infect Android phones and conduct SMS billing fraud. SMSFactory uses SMS and phone permissions to regularly send premium text messages and make calls to premium numbers... Read more...
Most of us likely babysat, mowed lawns, or worked part-time jobs to earn money as teens. However, teens in 2022 have some rather interesting and unexpected ways to make some extra cash. Minors are reportedly developing, discussing, and selling malware through a Discord server. What happened to paper... Read more...
Malicious software, commonly known as malware, is one of many threats to both cybersecurity and privacy. Cybercriminals can distribute malware to achieve a number of different goals, including siphoning funds from cryptocurrency wallets, stealing login credentials, or establishing botnets. However, cybercriminals... Read more...
It's a new era and there's a new bully in schools. A financial bully to the school administrations, at least. That bully is ransomware, and he's an annoying jerk. Ransomware is an ever increasing threat that most recently has affected schools, governments, hospitals, and even individual users. This particular type... Read more...
There are millions of Android apps in Google Play, and while there are safeguards in place to keep malicious ones from sneaking in, a few bad apples inevitably creep through the door. When that happens, millions of devices can end up infected. A recent security report called attention to a handful of them that have... Read more...
Last week, the US Federal Trade Commission (FTC) published a report according to which cryptocurrency scammers have swindled Americans out of over $1 billion since 2021. Cryptocurrency scams are rampant on social media sites, as well as messaging apps like Telegram. The scams often trade on the names of... Read more...
Much of the discussion surrounding cyberwarfare has centered around Russia and Ukraine, in recent months. While it may have been pushed into the background, however, China’s aggressive cyber activity continues apace, whether it rises to the level of warfare or not. Only a month ago, we covered news that Chinese... Read more...
Last week, security researchers published a report showing that the rate at which trojans infect mobile devices has been accelerating over the past few quarters. Trojans are a form of malware disguised as applications that users might want to install. Victims of trojans effectively invite malware onto their devices... Read more...
Earlier this week, we covered a report that claimed mobile device trojans are on the rise. Trojans are a specific kind of malware that infect victims’ devices by pretending to be legitimate and trustworthy applications. Unfortunately, trojans sometimes mange to sneak their way into the Google Play Store and infect... Read more...
The prevalence of ransomware attacks is rising year-over-year at a rapid pace, with 2021 marking a doubling in the number of reported attacks over 2020. As ransomware attacks have become a prominent and lucrative form of cyberattack, a market has developed for cybercriminals to buy and sell ransomware. Some of these... Read more...
We're halfway into 2022 and security researchers have started to publish data on emerging trends in cyber-security. The emerging trend that seems to be catching researchers attention today happens to be related to the largest, widest, and most diverse distribution of computing devices on the planet, mobile... Read more...
The only real certainties in life are death, taxes, and scammers trying to swindle you out of your money. In the digital age, that means phishing scams run rampant, as it's a relatively low effort and potentially high reward ruse. Some efforts are more convincing than others, perhaps such as the one that is targeting... Read more...
Windows updates are typically supposed to patch security holes, add new features, improve performance, increase stability, or offer some combination of all those things. They're not supposed to leave your PC in worse shape then before they were installed, though that sometimes happens. That's the case right now for... Read more...
Earlier this month, we reported on a phishing attack that stole $23.5 million from the US Department of Defense (DoD). Thankfully, the DoD caught the cybercriminals and recovered the money, but this incident highlights the need for strong cybersecurity practices at the DoD and among its contractors. The DoD is a high... Read more...
Lately, cybercriminals have been using Telegram to sell malware and other malicious tools as a service. Last month we reported on a Telegram bot that makes automatic phone calls to steal multi-factor authentication (MFA) codes. The Telegram bot gives bad actors an easy-to-use interface for placing scam phone calls and... Read more...
Another day another malware threat. Yes, yet another new way of delivering malware has shown up recently. That new way does not directly involve files but Windows Event Logs. According to security researchers at Kaspersky, a customer showed this new behavior. The method injects shellcode payloads into the event... Read more...
When you are investigating a crime, one of the most important things to establish is "motive." If you know a crime has been committed, having an understanding of why it happened is a critical step to figuring out who did it. In the strictest sense, installing software on someone else's computer isn't a crime. It's... Read more...
We all know that it is bad luck to cross a black cat. This particular black cat should make you run in the opposite direction. The FBI recently confirmed that the BlackCat ransomware compromised at least 60 organizations worldwide. The breaches occurred between November 2021 and March 2022. BlackCat/ALPHV... Read more...
When Microsoft added Windows Subsystem for Linux it was exciting for developers, but it also raised a question. "If Windows can run Linux, when will it run Android?" A logical inquiry of course, because Android is a Linux-based operating system. Unfortunately, now that Android Subsystem has been added, a bad egg has... Read more...
Another day another malware threat. Do you ever notice how, when you open an e-mail link, money in your bank account drains away? That shouldn't happen, but if it does, it's probably thanks to QBot's new distribution method. You might be thinking, 'Hey, I'm smart enough to know I shouldn't click on iffy links!'... Read more...
First ... Prev 2 3 4 5 6 Next