Stats confirm that trojans spreading, malware being built at record rates

Monday, May 6th, 2013

Trojans continue to dominate the threat landscape, according to Panda Security's latest quarterly report, released Monday. The anti-virus maker's research arm, PandaLabs, found that between January and March of this year, more than 6.5 million new malware strains were built, with trojans comprising 75 percent of those. In total, trojans were ...

Attack hitting Apache websites is invisible to the naked eye

Monday, April 29th, 2013

Ongoing exploits infecting tens of thousands of reputable sites running the Apache Web server have only grown more powerful and stealthy since Ars first reported on them four weeks ago. Researchers have now documented highly sophisticated features that make these exploits invisible without the use of special forensic detection methods. Linux/Cdorked.A, as ...

VirusTotal now offers PCAP analysis

Sunday, April 28th, 2013

VirusTotal is a greedy creature, one of its gluttonous wishes is to be able to understand and characterize all the races it encounters, it already understood the insurgent collective of Portable Executables, the greenish creatures known as Android APKs, the talkative PDF civilization, etc. as of today it also figures ...

Newly Discovered Android Malware Was Downloaded Millions Of Times

Saturday, April 20th, 2013

Security firm Lookout has detailed a clever new bit of Android Malware lurking in the Google Play store. The good news: unless you’re downloading questionable Russian clone apps, you’re probably not affected. The bad news: that hasn’t kept it from being downloaded a few million times. The new malware, fittingly dubbed “BadNews”, has ...

Malware-as-a-service allows victim management

Friday, June 22nd, 2012

A big amount of the malware out there are RAT (Remote administration tool) samples. This is software created by people specialized on it, people that develop, improve and sell their tools. It has capabilities that let the attacker spy on the victims with actions like screen capturing, keylogging, password stealing, ...