Malware

Dexter Malware, the rise of malware that hits point of sales

Security experts at Arbor Networks have found a couple of servers used to arrange a malicious campaign against PoS with…

12 years ago

Microsoft Security Intelligence Report consecrates Turkey as malware paradise

Microsoft Security Intelligence Report states the malware encounter rate in Turkey is far greater than that of any other country…

12 years ago

ChewBacca, the last Tor-based banking trojan

Kaspersky Lab experts have discovered a new Tor-based banking trojan named "ChewBacca", it is the last malware exploiting Tor network.…

12 years ago

NSA – A bios malware can remotely destroy any US system

During a CBS Interview show "60 Minutes", The NSA Director General Alexander and the Information Assurance Director Plunkett  claimed a…

12 years ago

Advanced Power hits Firefox Users to conduct vulnerability scanning

KrebsOnSecurity has discovered an unusual botnet that disguises itself as a legitimate add-on for Mozilla Firefox to perform website vulnerability…

12 years ago

ENISA Threat Landscape 2013 report, the rise of cyber threats

ENISA releases the ENISA Threat Landscape 2013, it a collection of information on top cyber-threats that have been assessed in…

12 years ago

Detected 64-bit ZeuS banking trojan using Tor network

Security researchers at Kaspersky Lab have detected a 64-bit Zeus banking trojan version enhanced with communication capability on the Tor…

12 years ago

Zero-day vulnerability exploits, too precious commodities

NSS Labs issued the report titled "The Known Unknowns" to explain dynamics behind the market of zero-day exploits. Last week…

12 years ago

Microsoft,Europol,FBI and partners decapitated ZeroAccess botnet

Microsoft Digital Crimes Unit, FBI, Europol and industry partners decapitated the feared ZeroAccess botnet that hijacks search results Microsoft this…

12 years ago

Malware can infect system using Inaudible Audio signals

German researchers demonstrated how a malware can infect system in air gapped networks and transfer stolen data using Inaudible Audio…

12 years ago

This website uses cookies.