Pro Data stolen from PC by controlling fan noise Researchers use Fansmitter malware to transmit data 28 Jun
Life Bart ransomware proves effective without sophisticated encryption New malware locks user files in password-protected ZIP archives 28 Jun
Pro Don’t run JS e-mail attachments: they can carry potent ransomware RAA locks users' files by using strong encryption 14 Jun
Pro Dell gets active in endpoint protection Dell Data Protection | Threat Defense provides enterprise security for those without the 18 May
Pro Cyberspies abuse Windows hotpatching to hide malware The Platinum cyberespionage group has been leveraging a Windows feature known as hotpatching to inject malicious code into running processes 28 Apr
Pro Bangladesh bank cyber-heist hackers used custom malware to steal $81m Lax security, cheap tools and custom malware to exploit SWIFT software resulted in lucrative heist 26 Apr
Pro Ransomware authors use bitcoin blockchain to deliver encryption keys CTB-Locker ransomware uses a metadata field in bitcoin transactions to store decryption keys 15 Apr
Pro Latest Flash zero-day used to spread ransomware Cerber crypto-malware spread through Flash vulnerability, reports Proofpoint 8 Apr
Pro Google engineer finds flaw in Node.js NPM scripts Self-replicating worm can easily spread through the ecosystem 30 Mar
Pro Ransomware takes Californian hospital offline Network offline for more than a week, $3.6m demanded as ransom 17 Feb
Pro Dell BIOS verification extends security focus BIOS protection now to include advanced authentication, encryption, and malware detection 8 Feb
Pro More than a quarter of all malware variants created in 2015 2015 saw record malware levels with more than 84 million new samples collected 2 Feb
Life Android malware steals one-time passcodes Call forwarding used to intercept voice calls with the passcode 13 Jan
Pro Protecting against ransom malware KeepItSafe describes the full horror of a cypto-lock attack 8 Jan
Pro Ransomware doubled last year, shifted focus to enterprise Malware escalation and CryptoLocker attacks are 2015 cybersecurity headlines, reports Kaspersky 6 Jan
Pro Symantec’s first antimalware software for vShield VMware's vShield architecture, broadly defined as a set of APIs for various security functions, has been something of a contentious issue in the past 30 Nov
Pro Microsoft enables unwanted software detection for enterprise customers Redmond offers protection against potentially unwanted applications in its anti-malware products for enterprise customers 30 Nov
Pro First Linux ransomware program cracked, for now Researchers create tool to recover ransomware encrypted files 11 Nov
Pro Hackers infect MySQL servers with malware for DDoS SQL injection used to exploit a MySQL feature, installing malware 3 Nov
Life Tricky malware replaces Chrome with a dangerous lookalike Browser doppelganger capable of system file hijacking, and activity monitoring 20 Oct
Life Android malware hammers phones with unwanted ads Kemoge malware contains eight root exploits, says FireEye 8 Oct
Pro Developers find themselves in hackers’ crosshairs Here's what enterprises need to do in order to protect their development environments from attack 1 Oct
Pro Dyreza malware steals IT supply chain credentials Cybercriminals are shifting gears from online banking to companies that provide order fulfilment, warehouse management, and other services 1 Oct
Pro Malware is so last year for discerning hackers Fraudsters increasingly rely on legitimate admin tools instead of malware to successfully breach systems and steal data 8 Sep
Pro No reason to panic over GPU malware Though harder to detect, graphic processing unit malware is not invisible, says McAfee 4 Sep
Pro HP’s new tools root out malware, app vulnerabilites Enterprise security suite gets new capabilities 3 Sep
Pro Researchers uncover more Regin spy tool modules Symantec researchers find 49 new modules for supposed NSA cyberespionage malware 1 Sep
Pro Tips for protecting your business against cyber-extortion The rising incidence of cyber-extortion is being driven in part by encryption malware 25 Aug
Pro Cisco warns over installation of rogue firmware Compromised administrative credentials were used to flash malicious boot firmware on Cisco IOS devices 17 Aug
Pro Simple tool used to create malicious Office files Check Point detects new version of Office Exploit Builder — malicious attachments on tap 28 Jul
Pro Kaspersky Lab short of explanations for Duqu 2.0 attack Still unclear what attackers were looking for, or what they found 15 Jun
Pro Windows 10 to allow apps to scan content for malware New Antimalware Scan Interface (AMSI) API announced, but will it be used? 15 Jun
Pro Spam infects PoS terminals with malware Counting on staff using terminals to browse the Web or check their personal email 27 May
Pro Verizon data breach report finds no mobile malware – is it all hype? 99 problems and mobile malware isn't even 1% of them 15 Apr
Life Google cracks down on ad-injecting Chrome extensions Rogue advertising problem found to extend way beyond browser add-ons 1 Apr
Subscribers 0
Fans 0
Followers 0
Followers