Quantcast
Last updated on April 21, 2014 at 12:45 EDT

Latest Malware Stories

2014-01-10 23:21:04

OSHI Software (http://www.oshisoftware.com), a developer of security solutions for Windows-based computing systems, announced that it will now accept Bitcoin payments for purchases of its OSHI Defender anti-malware product (https://www.oshidefender.com). The company also announced that it has added a new Cloud Antivirus feature to the OSHI Defender software. Los Angeles, CA (PRWEB) January 10, 2014 OSHI Software (http://www.oshisoftware.com), a developer of security solutions for...

2014-01-08 16:21:14

CLEARWATER, Fla., Jan. 8, 2014 /PRNewswire/ -- WHAT: ThreatTrack Security CEO Julian Waits, Sr. will present the company's strategy and technical roadmap for the future of cyber defense at The Raymond James Government Services & Technology Summit tomorrow...

2014-01-08 08:34:21

Responder Pro 2.1 Advances Industry's Malware Detection and Analysis Capabilities SACRAMENTO, Calif., Jan. 8, 2014 /PRNewswire/ -- In a move to significantly close the gap between discovery and mitigation of targeted attacks, HBGary, a part of ManTech International Corporation, today made available a new version of Responder Pro, the industry standard in Windows® memory forensics. (Logo: http://photos.prnewswire.com/prnh/20140108/NE42259LOGO ) By leveraging Digital DNA(TM) 3.0, the latest...

PowerLocker Ransomware Coming Soon
2014-01-08 07:43:08

redOrbit Staff & Wire Reports - Your Universe Online Malware developers will soon be selling a new generation of ransomware called PowerLocker that encrypts files on a victim’s computer and then demands money to decrypt and recover the infected files. The news was disclosed last Friday in a blog post by a volunteer group of anti-malware security researchers known as Malware Must Die (MMD), who discovered the threat while monitoring chatter on underground hacker forums that...

2014-01-07 23:24:38

Email-based Threats Leader Delivers STIX (Structured Threat Information Expression) Format in New Release of Today’s Top Threats (T3) Product Pittsburgh, PA and Birmingham, AL (PRWEB) January 07, 2014 Malcovery® Security, the leader in delivering actionable intelligence that can be applied to neutralize email-based threats such as phishing, spam and malware, today announced the release of a new version of Today’s Top Threats (T3) product that supports emerging industry standard...

2014-01-07 08:24:44

New name signals transformation into a cloud-based information security solution provider MCLEAN, Va., Jan. 7, 2014 /PRNewswire/ -- Commtouch® (NASDAQ: CTCH) announced it is operating globally under the name CYREN, effective immediately. The company adopted its new name as it completes its transformation into a leading provider of cloud-based information security solutions that are specially designed to be deployed or private labeled by customers and partners alike. As the global...

2014-01-06 12:31:44

Light Cyber's MAGNA detected breaches from new Bitcoin mining malware some four days before the campaign became widely known, proving the system's superiority in detecting and containing breaches from unknown malware early in the attack life cycle RAMAT GAN, Israel, January 6, 2014 /PRNewswire/ -- Light Cyber (http://www.lightcyber.com), an emerging provider of innovative Predictive Breach Detection solutions, today announced that its customer-installed MAGNA appliances were...

Yahoo's Advertising Servers Infiltrated By Malware
2014-01-06 04:39:35

redOrbit Staff & Wire Reports - Your Universe Online Internet surfers visiting Yahoo.com over the past few days have reportedly been exposed to malware distributed by a third party through the web portal’s advertising servers. According to Washington Post blogger Timothy B. Lee, two Netherlands-based computer security firms – Fox-IT and Surfright – have confirmed the presence of the malicious code, which “appears to be the work of malicious parties who have hijacked Yahoo's...

UK Hackers Raid ATMs With USB Sticks, Add Money-Making Malware
2013-12-31 13:49:32

Peter Suciu for redOrbit.com - Your Universe Online Cybercriminals in Europe are reportedly targeting cash machines using USB drives. The thieves cut holes in the fascia to access a USB port and then uploaded malware to the machines. This allowed the thieves to essentially empty the cash machine at their convenience. These attacks, which actually occurred last summer, were disclosed at this week’s annual Chaos Computing Congress in Hamburg and reported by several European news...

2013-12-31 12:22:51

OTTAWA, Dec. 31, 2013 /CNW/ - With Trend Micro cyber threat analysts predicting that individuals, businesses and governments will face a proliferation of sophisticated digital threats in 2014, New Years is the perfect time to choose a few simple resolutions to keep you and your personal information safe. "Unlike hitting the gym everyday, committing to lead a safer and healthier online life is among the simpler New Year's resolutions to keep. A few minutes of your time and the...


Latest Malware Reference Libraries

0_173bb487cd480e12bc1008c4301cd186
2013-03-16 00:00:00

A wiki is simply a website that allows the users to create and edit any number of interlinked web pages through a simplified markup language. They are often powered with wiki software and used to collaborative wiki websites, power community websites, for note taking, and in knowledge management systems. Some wikis serve specific purpose while others are more of an open content format. Wiki, meaning fast in Hawaiian, was first created by Ward Cunningham who developed WikiWikiWeb. Wikis...

More Articles (1 articles) »