Skip to main content
  1. Home
  2. malware

malware

hacks header

Russian hackers are targeting U.S. emails with phishing malware

Hackers are targeting both U.S. and European email accounts with new phishing malware, according to a new study. Named "Cannon," the malware has been around since October, collecting screenshots and other information from the PCs of unsuspecting victims and sending it back to Russian operatives. 
Moving the router: Linksys WRT3200 ACM router review

Hacker infects 100K routers in latest botnet attack aimed at sending email spam

Researchers discovered a new botnet that targets your router in order to send out email spam. Approximately 100,000 routers worldwide are now infected, with a large distribution of affected devices in India, China, and the United States. The hacker is using a complex script to carry out his attack.
microsoft edge click to run flash header

Beware of malware, adware when downloading Google Chrome through Microsoft Edge

Downloading Google Chrome through Microsoft Edge is apparently dangerous, as a Bing search returned a fake advertisement that leads to suspected malware. The link leads to a legitimate-looking website that could trick unsuspecting users, as pointed out on Twitter by user Gabriel Landau.
Flash software

Spoof Adobe Flash updaters are inserting cryptocurrency mining malware

New research from cybersecurity firm Palo Alto Networks shows that Cryptocurrency mining malware could be hiding in your Adobe Flash Update. Though it is not certain how users end up at URLS which hide the malware for these attacks, there has been a significant spike recently.
malwarebytes laptop

In mobile cyberwar, attackers prefer to phish rather than send malware

Though hackers continue to target emails as a means of cyberattack, researchers found that only 10 percent of emails contain malware. In fact, 90 percent of email attacks now use social engineering, like phishing, to target victims.
Apple MacBook Pro OLED with Touch Bar

Apple allowed spyware posing as anti-malware tool into its Mac App Store

If you think you can trust the apps in Apple's carefully vetted Mac App Store, think again. Security researchers discovered that Adware Doctor, one of the most popular apps on the App Store, was actually a spyware disguised as an anti-malware tool.
fortnite mobile makes me feel old op ed feat

Epic Games unhappy with Google’s disclosure of ‘Fortnite’ launcher vulnerability

A security vulnerability in the installer for Fortnite on Android was recently discovered, and though it was quickly patched, developer Epic Games has taken issue with how Google chose to disclose it. The vulnerability did not affect other versions of the game and was first discovered in mid-August.
A person using Outlook on a Macbook.

Just when you thought spam was dead, it’s back and worse than ever

Spam emails are among the oldest methods of spreading malicious software, but it's proving to be the most effective in 2018. As ransomware loses its vogue status and exploit kits become less effective, spam has returned as the go-to method for spreading malware and viruses to unsuspecting email users.
malwarebytes laptop

How A.I. can defeat malware that doesn’t even exist yet

Ditching signatures, Cylance Smart Antivirus is now available for consumers and it only offers AI protection. That machine learning algorithm though, is all you need, according to Cylance's senior VP, Christopher Bray. Can an AI really protect us from malware of today and tomorrow with no help at all?
turkey blocks tor dark web keyboard key

The demand for hacking tools and malware is greater than the current supply

A report published by Positive Technologies reveals an extremely high demand for malware creation on the dark web: Three times greater than the current supply. The report is based on 25 Russian and English-based dark web sites with around three million registered individuals.
mylobot multiple payloads all in one botnet cropped

An all-in-one botnet is on the rise, packing a scary buffet of attacks

A new "complicated" botnet dubbed as MyloBot is on the rise packing the largest arsenal to date, targeting Windows-based PCs to steal data, shut down networks, and more. The underlying malware can evade detection, deliver numerous payloads, and even delete other malware discovered on target PCs.
modem vs router plugging in

FBI: Reboot, reset your router immediately to prevent cyberattacks

To protect yourself from the VPNFilter malware, the FBI urges all users to reboot their routers. To be extra cautious, you can also perform a factory reset to restore your router to factory conditions and permanently clear out all traces of the malware. If infected, the malware can steal and wipe out your data.
the fbi wants you to reboot your router insecure getty

Duck, cover, and reboot your router? Why the FBI’s new warning is no joke

The FBI has discovered up to 500,000 home or office routers could be vulnerable to a dangerous cyberattack. According to experts, there are a couple of important factors that make this malware an unprecedented situation. But can resetting your router really prevent a major cyberattack?
smart cities focus feature

Are smart cities as safe as we think they are? Security experts say not yet

New research by non-for-profit global security association ISACA has revealed that security experts believe that malware, ransomware, and denial of service attacks continue to pose a threat to smart city infrastructure, including the energy sector, communications, and financial services.
Close-up of hands on a laptop keyboard in a dark room.

U.S. claims North Korea has been silently infiltrating networks since 2009

The Department of Homeland Security and the Federal Bureau of Investigation claim North Korea has been silently infiltrating the media, aerospace, financial, and critical infrastructure sectors both in and out of the United States. The campaign is led by a state-sponsored hacker group dubbed as Hidden Cobra.
Mobile Malware

Avoid the latest Android malware scare by remembering this one thing

An unpleasant piece of malware called Cosiloon has been discovered hiding inside the firmware of hundreds of Android devices, according to virus experts Avast. Luckily, it's unlikely your Android tablet or phone is affected, and there is an easy way to avoid it in the future.
ransomware

The Google Play store hosted malware meant to steal from North Korean defectors

McAfee researchers have discovered that hackers with links to the North Korean regime managed to make Google complicit in stealing information. As per a recently published blog post, the Google Play store has apparently been playing host to at least three apps designed to collect data from certain people.
researchers use ambient light sensor data to steal browser exhausted man computer problems desk hacking hackers malware frust

New malware will crash your PC if you try to thwart its digital coin mining

360 Total Security discovered new malware used by hackers to mine digital coins on infected PCs. It attaches itself to the critical system services in Windows, thus any manual attempt to stop the digital coin mining will trigger the Blue Screen of Death. It hides from popular antivirus solutions, too.
malware attack chilis restaurants

Malware attack hits Chili’s restaurants, customer payment info nabbed

Recent visitors to Chili's restaurants may have had their payment information stolen. The company says the payment systems at "some" of its restaurants were compromised by malware in March and April. The breach came to light on May 11, with the restaurant chain making it public a day later.
360 degree mri scan video 1500x1001

Windows-powered medical scanners are being hit by health care hackers

Hackers have been targeting MRI and X-Ray machines, as well as pill label printers, logistics companies, and IT departments, all related to U.S. health care in some manner. It's not clear what the hackers want, but their ability to infiltrate national systems has security researchers concerned.
HTC Vive Pro review

Researchers claim hackers can create havoc in the Oculus Rift, HTC Vive

A recent paper published by researchers from the University of New Haven in Connecticut shows that a vulnerability in OpenGL enables the team to alter the playing space and virtual environment on the HTC Vive and Oculus Rift headsets. It's just a proof-of-concept but possible nonetheless.
Graphics cards in a crypto mining farm.

Cryptojacking is the new ransomware. Is that a good thing?

Malicious cryptominers and cryptojacking is a hot new malware trend that's been sweeping websites and victim systems for many months now. They've become so prevalent that ransomware is far less of a concern to consumers and businesses, but does that mean the new kid on the block is here to stay?
kaspersky releases tool to counteract cryptxxx ransomware

Verizon agrees, ransomware is the most popular form of malware

According to Verizon's 2018 Data Breach Investigations Report, ransomware has emerged as one of the most common forms of malware among organizations. The reason: cybercriminals are mostly influenced by a desire to make money and ransomware is one of the easiest and cheapest ways to attack.
delta

Infected online chat service stole payment info at Best Buy, Delta, Sears, more

A number of companies are reporting that a chat client service used on their websites was found infected with malware and stole payment info.
Microsoft Surface Pro 4 Chrome

Chrome’s built-in scanning tool is now causing a privacy uproar

Privacy concerns now surround the Chrome Cleanup component in Google Chrome, causing users to question the scans.
An individual surrounded by several computers typing on a laptop.

From pranks to nuclear sabotage, this is the history of malware

The history of malware has evolved alongside our favorite software. What started innocently enough has become a global threat of staggering proportions.
Google play

500,000 people downloaded QR code apps with embedded malware from Google Play

QR code reader apps with malicious malwar inside of them were downloaded up to 500,000 times, according to a new report from Sophos.
malwarebytes laptop

Slingshot malware that attacks routers may be state-sponsored espionage tool

Kaspersky has identified a router malware, dubbed Slingshot, that attacks local PCs and steals information. It's so sophisticated that it's likely state-sponsored.
hacker

Windows Defender thwarts major malware attack directed mostly at Russian users

Microsoft said its Windows Defender platform thwarted a campaign that sought to distribute a trojan packing a cryptocurrency miner payload.
researchers use ambient light sensor data to steal browser exhausted man computer problems desk hacking hackers malware frust

Hackers target Windows clipboard to steal cryptocurrency wallet addresses

The latest email scam contains malware that will install on Windows machines and scan the clipboard for copied cryptocurrency wallet addresses.
A depiction of a hacker behind a screen of code.

Beware of Thanatos, the latest cyber-extortion scam

A new ransomware infection that demands payment in Bitcoin Cash is causing problems because there's no way for even its creators to decrypt it.
online porn addicting erectile dysfunction 59187043  button on the computer keyboard

Adult content domains are home to half the sites using cryptomining malware

The act of cryptomining, by hijacking a user's CPU without permission to create new cryptocurrency, is expanding rapidly. The vast majority of sites containing the intrusive software are ones that offer adult content.
google ads cryptocurrency malware hong kong lifestyle bitcoin

Is your browser mining bitcoin? ‘Malvertisements’ are hijacking Google Ads

As if invasive ads weren't bad enough, Trend Micro has uncovered a particularly sinister batch of 'malvertisements' that aim to exploit Google's DoubleClick ad service to serve you ads containing hidden cryptocurrency mining software. 
riton malware

Sophisticated ‘Triton’ malware shuts down industrial plant in hacker attack

Hackers successfully breached the security at an unnamed industrial facility, but were unable to gain control of the safety controls.