DDoS malware for Linux systems comes with sophisticated custom-built rootkit

Friday, February 6th, 2015

A malware program designed for Linux systems, including embedded devices with ARM architecture, uses a sophisticated kernel rootkit that's custom built for each infection. The malware, known as XOR.DDoS, was first spotted in September by security research outfit Malware Must Die. However, it has since evolved and new versions were seen ...

Study Uncovers 40,000 Malicious Mobile Banking Apps

Thursday, January 22nd, 2015

Mobile banking is an increasingly popular way to stay on top of one’s finances, with the ability to check balances, transfer money and even deposit checks virtually. Unfortunately, the sector is also a rich tapestry of criminal activity, with 11% of mobile banking apps categorized as “suspicious.” According to research findings ...

New “Skeleton Key” malware allows bypassing of passwords

Tuesday, January 13th, 2015

Remember when we discussed how passwords were dead? If you needed more proof that this is true, the bad guys have you covered with a new piece of malware that turned up in the wild. SecureWorks, the security arm of Dell, has discovered the new piece of malware dubbed "Skeleton Key." ...

New Apple malware is undetectable, unstoppable, and can infect any Thunderbolt-equipped device

Thursday, January 8th, 2015

Apple products have long enjoyed a reputation for superior security in relation to Windows systems, but a new proof-of-concept malware delivery method could put a serious dent in that reputation. The exploit, dubbed Thunderstrike, currently can’t be detected or removed by any known process without using specialized hardware. Security researcher ...

Your Browser is (not) Locked

Wednesday, December 17th, 2014

Most ransomware has a binary file that needs to be executed before it can infect your PC. Ransomware usually relies on social engineering or exploits to infect unsuspecting users. However, some malware authors are bypassing this requirement with a new trick - browser lockers. Unlike traditional ransomware threats that lock the entire desktop, ...