Researchers discover credential-stealing Unix-based server botnet

Wednesday, March 19th, 2014

Dubbed Operation Windigo, the attack has been ongoing for more than two and a half years and has compromised as many as 25,000 servers at one time, anti-virus vendor ESET said Tuesday. Systems infected with the backdoor Trojan are used in stealing credentials, redirecting Web traffic to malicious content and ...

Java-based malware hits Windows, Mac and Linux

Wednesday, January 29th, 2014

Kaspersky Lab researchers have recently analysed a piece of malware that works well on all three of the most popular computer operating systems - the only thing that it needs to compromise targeted computers is for them to run a flawed version of Java. The Trojan is written wholly in Java, and exploits ...

Hackers Have Used A Refrigerator To Attack Businesses

Friday, January 17th, 2014

Security researchers at Proofpoint have uncovered the very first wide-scale hack that involved television sets and at least one refrigerator. Yes, a fridge. This is being hailed as the first home appliance "botnet" and the first cyberattack from the Internet of Things. A botnet is a series of computers that seem to be ...

Unique malware evades sandboxes

Thursday, December 19th, 2013

On Wednesday, security vendor Seculert reported finding that one of five malware types used in the attack had a unique cloaking property for evading sandboxes. The company called the malware DGA.Changer. DGA.Changer's only purpose was to download other malware onto infected computers, Aviv Raff, chief technology officer for Seculert, said on ...

Fake ‘If I Die’ Facebook app kills your computer

Tuesday, September 13th, 2011

The premise of a new (and fake) Facebook app called "If I Die" is sweet if a little morbid: You record a video message that will be played for your loved ones after your death. As the app advertisement says: "Death can catch you anywhere, anytime. Leave your If I ...