Mass Injection Attack Affects 40,000 Websites

Tuesday, June 2nd, 2009

Researchers at Websense have discovered a mass injection attack that is redirecting Web browsers to a malware-bearing site. According to a weekend report by researchers at Websense, thousands of legitimate Web sites have been discovered to be injected with malicious Javascript, obfuscated code that leads to an active exploit site. "The active ...

Malwarebytes’ Anti-Malware 1.37 Released

Wednesday, May 27th, 2009

Malwarebytes' Anti-Malware is considered to be the next step in the detection and removal of malware. In our product we have compiled a number of new technologies that are designed to quickly detect, destroy, and prevent malware. Malwarebytes' Anti-Malware can detect and remove malware that even the most well known ...

Gumblar Malware Exploit Circulating

Monday, May 18th, 2009

US-CERT is aware of public reports of a malware exploit circulating. This is a drive-by-download exploit with multiple stages and is being referred to as Gumblar. The first stage of this exploit attempts to compromise legitimate websites by injecting malicious code into them. Reports indicate that these website infections occur ...

Most Malware Hosted On Trusted Sites

Tuesday, May 12th, 2009

Symantec's MessageLabs says the assumption most web-based malware originates from recently created, temporary, trashy adult sites is becoming an old-fashioned notion. Modern hackers are focusing on well-established, trusted websites they can compromise-sites users trust every day of the week. According to data collected last week, 84.6 percent of website domains blocked ...

D-Link adds CAPTCHA anti-trojan security to routers

Tuesday, May 12th, 2009

D-Link have announced new CAPTCHA security for selected models in their router range, promising more resilience against DNS-altering malware and spyware. The new firmware - which is also available to upgrade on existing models - adds the familiar distorted letters and numbers to common router settings pages. By changing the DNS ...