Computer Viruses

latest news headlines

'Is Dr M a Trojan Horse seeking to demolish Troy?'.

This is the question posed by an article published in the PAS organ Harakah Daily.

- Malaysiakini - MY

Inside the FBI's hunt for notorious Russian hacker and Zeus malware creator Evgeniy Bogachev, who has intelligence ties and a $3M bounty on his head .

Garrett M. Graff / Wired: Inside the FBI's hunt for notorious Russian hacker and Zeus malware creator Evgeniy Bogachev, who has intelligence ties and a $3M bounty on his head  —  On the morning of December 30, the day after Barack Obama imposed sanctions on Russia for interfering in the 2016 US election …

- Techmeme - US

Anti-Virus Vendors Scramble To Patch Hijacking Exploit Involving Microsoft Tool.

"A zero-day attack called Double Agent can take over antivirus software on Windows machines," Network World reported Wednesday. wiredmikey writes: The attack involves the Microsoft Application Verifier, a runtime verification tool for unmanaged code that helps developers find subtle programming errors in their ...

- Slashdot - US

Google Play faces cat and mouse game with sneaky Android malware.

What's the best way to avoid Android malware? Downloading all your apps from the Google Play store -- where software is vetted – is perhaps the best advice.  But that doesn't mean Google Play is perfect.Security researchers do find new Android malware lurking on Google's official app store. That's because hackers are ...

- CIO.com - US

WikiLeaks: Apple's fix for CIA DarkMatter hacks is 'duplicitous'.

WikiLeaks claims that the CIA upgraded on its DerStarke malware loader to infect Apple products.

- IBTimes.co.uk - UK

Manhunt for the Creator of a Malware 'Masterpiece'.

Evgeniy Mikhailovich Bogachev, once described by a cybersecurity expert as the "most prolific bank robber in the world," ended up on a different list altogether in December: as one of the individuals noted in then-President Obama's sanctions against Russia for trying to influence the election. As Garrett M. Graff ...

- Newser - US

Google Play faces cat and mouse game with sneaky Android malware.

What’s the best way to avoid Android malware? Downloading all your apps from the Google Play store -- where software is vetted – is perhaps the best advice.  But that doesn’t mean Google Play is perfect.Security researchers do find new Android malware lurking on Google’s official app store. ...

- Network World - US

Apple: Macs and iPhones are safe from newly revealed CIA exploits.

The Mac and iPhone exploits described in new documents attributed to the U.S. Central Intelligence Agency were patched years ago, according to Apple.WikiLeaks released a new set of files Thursday that supposedly came from the CIA. They contain details about the agency’s alleged malware and attack capabilities against ...

- Network World - US

Google Play faces cat and mouse game with sneaky Android malware.

What's the best way to avoid Android malware? Downloading all your apps from the Google Play store -- where software is vetted – is perhaps the best advice.   But that doesn't mean Google Play is perfect. Security researchers do find new Android malware lurking on Google's official app store. That's because hackers are ...

- PCWorld.com - US

Apple: Macs and iPhones are safe from newly revealed CIA exploits.

The Mac and iPhone exploits described in new documents attributed to the U.S. Central Intelligence Agency were patched years ago, according to Apple.WikiLeaks released a new set of files Thursday that supposedly came from the CIA. They contain details about the agency's alleged malware and attack capabilities against ...

- PCWorld.com - US

Malware That Targets Both Microsoft, Apple Operating Systems Found.

A new strain of malware is designed to spread malware on either Mac OS X or Microsoft Windows, depending on where it's opened.

- threatpost - US

Can the CIA hack your iPhone? What you need to know about the WikiLeaks dump.

The CIA has put quite a bit effort into figuring out ways to hack Apple devices.That's the takeaway from the latest batch of documents dumped by WikiLeaks. The so-called "Dark Matter"documents, published Thursday, detail methods allegedly used by the CIA to infect MacBooks and some older iPhones with malware that allowed ...

- Mashable! - US

Microsoft Word Document Used to Infect Both Windows and macOS with Malware

Security company FortiGuard Labs warns that a malicious Microsoft Word document is being used these days to compromise both Windows and macOS systems using the macro feature that makes it possible to download malware on target systems. The macro feature integrated into Microsoft's Office productivity suite has already been ...

- Softpedia - US

WikiLeaks unveils how CIA reportedly hacked our Apple products

A document cache released by WikiLeaks reportedly shows how the CIA has been hacking your iPhone for almost a decade. WikiLeaks opened Vault 7 — a massive collection of alleged CIA hacking secrets — earlier this month. Now its released Dark Matter,' new documents from the Vault dating as far back as 2008 which ...

- The Next Web - US

WikiLeaks dump shows how CIA compromised iPhones and Macs

WikiLeaks' latest document dump allegedly shows the CIA has devoted a lot of time to going after Apple products. The leaking organization released another dose of documents on Thursday that detail "several CIA projects that infect Apple Mac firmware ... developed by the CIA's Embedded Development Branch," according to the ...

- Mashable! - US

'Invoice' spammers pervert RTF files to hide malware

Malformations galore.

- iTnews - AU

DoubleAgent Malware Seizes Control Of Antivirus Software

New zero-day attack exploits old Windows vulnerability to take 'full control' of 'major antivirus' products

- TechWeekEurope - UK

The Clever 'DoubleAgent' Attack Turns Antivirus Into Malware

The bug potentially puts every Windows antivirus program at risk, but also hints at more fundamental problems with relying on AV. The post The Clever 'DoubleAgent' Attack Turns Antivirus Into Malware appeared first on WIRED.

- Wired Magazine - US

Fresh Wikileaks Dump Shows CIA Was Hacking iPhones A Year After Launch

CIA docs indicate agency had created malware for iPhones shortly after its release.

- Forbes.com - US

New Vault 7 leaks show CIA can install persistent malware on OS X and iOS devices

Wikileaks has released the next instalment of documents from its Vault 7 leaks. The instalment dubbed "Dark Matter" details how the CIA have compromised Apple products including Macs and iPhones.

- Neowin.net - US

Russian man pleads guilty over $500m malware scam

A Russian man faces up to 10 years in jail for spreading a computer virus that cost victims more than $500m .

- BBC - UK

These are the phones that receive regular security patches, according to Google

Pixels, a lot of Nexus devices, and a few names that are a welcome addition. In its 2016 Android security year in review post, Google highlighted steps it has taken over the course of the year to thwart malware and malicious apps on the Play Store. The company said that only 0.05% of apps downloaded from the Play Store in ...

- Android Central - US

Fake mobile base stations spreading malware in China

'Swearing Trojan' pushes phishing texts around carriers' controls Chinese phishing scum are deploying fake mobile base stations to spread malware in text messages that might otherwise get caught by carriers.…

- TheRegister - UK

Google cites progress in Android security, but patching issues linger

The chances of you encountering malware on your Android phone is incredibly small, according to Google.By the end of last year, less than 0.71 percent of Android devices had installed a "potentially harmful application," such as spyware, a Trojan, or other malicious software.That figure was even lower, at 0.05 percent, for ...

- Network World - US

These are the phones that receive regular security patches, according to Google

Pixels, a lot of Nexus devices, and a few names that are a welcome addition. In its 2016 Android security year in review post, Google highlighted steps it has taken over the course of the year to thrawt malware and malicious apps on the Play Store. The company said that only 0.05% of apps downloaded from the Play Store in ...

- Android Central - US

Google cites progress in Android security, but patching issues linger

The chances of encountering malware on your Android phone is incredibly small, according to Google. By the end of last year, less than 0.71 percent of Android devices had installed a potentially harmful application,' such as spyware, a Trojan, or other malicious software. That figure was even lower, at 0.05 percent, for ...

- PCWorld.com - US

Malware 'disguised as Siemens firmware drills into 10 industrial plants'

Four years of active infection, claims security biz Dragos Malware posing as legitimate firmware for Siemens control gear has apparently infected industrial equipment worldwide over the past four years.…

- TheRegister - UK

Android security report: Google aims to clean up 'unwanted software' in 2017

As Google tackles malware on Android devices, it's also starting to take note of the distinct risk of apps that collect data without consent.

- ZDNet - UK

Rogue advertising on major porn websites targeting UK viewers warns Malwarebytes

Malvertising is unique in its ability to expose millions of users to malware, expert says

- IBTimes.co.uk - UK

This 'Killer' American Surveillance Tech Helped Russians Spy On iPhones

A Las Vegas company's iPhone and Android malware spreads to Russia, in an unparalleled spread of American surveillance tools.

- Forbes.com - US

Malware campaign targets users in Latin America

A modified version of a threat that first appeared in 2014 is successfully targeting users in Latin America according to the SPEAR research team at threat prevention specialist Cylance. Attackers using the El Machete malware -- first identified by Kaspersky -- have moved to new C2 infrastructure, based largely around ...

- BetaNews.Com - US

Double Agent attack can turn antivirus into malware

A zero-day attack called Double Agent can take over antivirus software on Windows machines and turn it into malware that encrypts files for ransom, exfiltrates data or formats the hard drives.Based on a 15-year-old feature in Windows from XP through Windows 10, the attack is effective against all 14 antivirus products ...

- Network World - US

Web smut seekers take resurgent Ramnit malware from behind

♪ Botnet knocked down, but it gets up again ♪ Aficionados of salacious smut sites in the UK and Canada are picking up some nasty software that infects systems by using corrupted pop-under adverts.…

- TheRegister - UK

Web Encryption Needs the Freedom To Grow - But New Policy Threats Are Emerging

Should the burden of fraud and malware detection live with the certificate authorities? Or should they simply provide certificates and get the heck out of the way?...

- theWHIR - US

New Star Trek-themed attack goes where no ransomware has gone before

A new Star Trek-themed malware variant has gone where no ransomware has gone before by demanding a ransom payment in Monero, an up-and-coming cryptocurrency that competes with bitcoin. The “Kirk” ransomware, first discovered by Avast Software s.r.o. malware researcher Jakub Kroustek, is being distributed under ...

- SiliconANGLE - US

Locky, Cerber Ransomware Skilled at Hiding

Since January, a number of ransomware families are sharing a common infrastructure with different techniques allowing the malware to hide from detection systems.

- threatpost - US

Microsoft's 'Application Verifier' bug-finder is easily pwnable

Undocumented feature allows installation of persistent malware Don't create undocumented features' should be tattooed in the corner of every developer's eye: there's one in the Microsoft Application Verifier Provider that provides attack vectors on everything Windows since XP.…

- TheRegister - UK

Latest Tax Scams Include Phishing Lures, Malware

Microsoft warns this year's crop of tax scams use social engineering attacks based on fear to spread banking Trojans and collect personal info.

- threatpost - US

How MetaX Plans To Use Blockchain To Stop Ad Fraud

Digital advertising is plagued with fraud, from phantom ads that no one ever sees to injecting malware-laden ads into websites. That’s what new self-funded Los Angeles startup MetaX aims to solve using blockchain, the distributed ledger technology behind bitcoin.

- Forbes.com - US

How to use Process Explorer, Microsoft's free, supercharged Task Manager alternative

If you've been using Windows for a while, there's a good chance you've had to use the built-in Task Manager at some point or another. Whether it's to kill a frozen process, track down some nasty malware, or figure out what's eating up all that memory, the Task Manager is an invaluable tool for any intermediate or advanced ...

- PCWorld.com - US

MetaX wields blockchain in bold bid to clean up digital advertising

It's no secret that digital advertising is riddled with fraudsters and scammers who do everything from running phantom ads never viewed by a human being to injecting malware-laden ads into websites. That's the problem that a startup called MetaX hopes to solve using blockchain, the distributed ledger technology behind ...

- SiliconANGLE - US

Russian hacker accused of creating Citadel malware which infected nearly 11 million computers pleads guilty

Mark Vartanyan, 29, was allegedly involved in distributing the Citadel malware, which at its peak, caused over $500m in losses.

- IBTimes.co.uk - UK

World's first computer virus hit the Apple II 35 years ago

35 years ago, the first piece of malware to ever spread out in the wild came into existence. Dubbed "Elk Cloner" and created by a 15-year old programmer named Rich Skrenta, Elk Cloner was a boot sector virus that targeted the Apple II and spread via floppy disk. Fueled by curiosity as opposed to malice, Skrenta designed Elk ...

- Boy Genius Report - US

Pwn2Own hacking contest ends with two virtual machine escapes

Two teams of researchers managed to win the biggest bounties at this year's Pwn2Own hacking contest by escaping from the VMware Workstation virtual machine and executing code on the host operating system.Virtual machines are in used in many scenarios to create throw-away environments that pose no threat to the main ...

- Network World - US

Pwn2Own hacking contest ends with two virtual machine escapes

Two teams of researchers managed to win the biggest bounties at this year's Pwn2Own hacking contest by escaping from the VMware Workstation virtual machine and executing code on the host operating system. Virtual machines are in used in many scenarios to create throw-away environments that pose no threat to the main ...

- PCWorld.com - US

Russian pleads guilty to charge related to Citadel malware

A Russian man accused of helping develop and distribute malicious software designed to steal personal financial information pleaded guilty Monday to a charge of computer fraud.

- PhysOrg - NL

D.C. Circuit Court Issues Dangerous Decision for Cybersecurity: Ethiopia is Free to Spy on Americans in Their Own Homes

The United States Court of Appeals for the District of Columbia Circuit today held that foreign governments are free to spy on, injure, or even kill Americans in their own homes--so long as they do so by remote control. The decision comes in a case called Kidane v. Ethiopia, which we filed in February 2014. Our client, who ...

- EFF - US

Feed