New fileless malware found in the wild

Tuesday, April 21st, 2015

Since the discovery of the Poweliks fileless Trojan in August 2014, researchers have been expecting other similar malware to pop up. The wait is over: Phasebot malware, which also has fileless infection as part of its routine, is being sold online. "Unlike most malware, fileless malware hides itself in locations that are ...

Researchers identify attack technique, all Windows versions at risk

Monday, April 13th, 2015

Researchers with Cylance have identified a new attack technique – built on a vulnerability identified nearly 20 years ago by Aaron Spangler – that can enable the theft of user credentials from PCs, tablets and servers running any version of Windows, according to a Monday post by Cylance. The “Redirect to ...

No Backdoors in Truecrypt, Finds Code Review

Tuesday, April 7th, 2015

A long-awaited code review of encryption service Truecrypt has finally been completed, with the good news being that there are no deliberate backdoors in the “relatively well-designed” piece of software. Cryptographic expert Matthew Green revealed the news in a blog post last week, claiming that the NCC Crypto Services group had found “no ...

New crypto-ransomware “quarantines” files, downloads info-stealer

Tuesday, April 7th, 2015

Trend Micro researchers have found and analyzed a new piece of crypto-ransomware: CryptVault encrypts files, makes them look like files quarantined by an AV solution, asks for ransom and, finally, downloads info-stealer malware. It arrives on target computers after the user has been tricked into downloading and running a malicious attachment ...

New router DNS attack delivers porn and game ads on mainstream websites

Thursday, March 26th, 2015

Of all the various malware attack vectors, hacking a person’s router is one of the most effective. A new report from Ara Labs highlights how router attacks have evolved in recent years, and details a new method of serving unwanted advertising via intercepted Google Analytics information. When evil routers attack The reason ...