Quantcast

Latest Malware Stories

2014-01-08 08:34:21

Responder Pro 2.1 Advances Industry's Malware Detection and Analysis Capabilities SACRAMENTO, Calif., Jan. 8, 2014 /PRNewswire/ -- In a move to significantly close the gap between discovery and mitigation of targeted attacks, HBGary, a part of ManTech International Corporation, today made available a new version of Responder Pro, the industry standard in Windows® memory forensics. (Logo: http://photos.prnewswire.com/prnh/20140108/NE42259LOGO ) By leveraging Digital DNA(TM) 3.0, the latest...

PowerLocker Ransomware Coming Soon
2014-01-08 07:43:08

redOrbit Staff & Wire Reports - Your Universe Online Malware developers will soon be selling a new generation of ransomware called PowerLocker that encrypts files on a victim’s computer and then demands money to decrypt and recover the infected files. The news was disclosed last Friday in a blog post by a volunteer group of anti-malware security researchers known as Malware Must Die (MMD), who discovered the threat while monitoring chatter on underground hacker forums that...

2014-01-07 23:24:38

Email-based Threats Leader Delivers STIX (Structured Threat Information Expression) Format in New Release of Today’s Top Threats (T3) Product Pittsburgh, PA and Birmingham, AL (PRWEB) January 07, 2014 Malcovery® Security, the leader in delivering actionable intelligence that can be applied to neutralize email-based threats such as phishing, spam and malware, today announced the release of a new version of Today’s Top Threats (T3) product that supports emerging industry standard...

2014-01-07 08:24:44

New name signals transformation into a cloud-based information security solution provider MCLEAN, Va., Jan. 7, 2014 /PRNewswire/ -- Commtouch® (NASDAQ: CTCH) announced it is operating globally under the name CYREN, effective immediately. The company adopted its new name as it completes its transformation into a leading provider of cloud-based information security solutions that are specially designed to be deployed or private labeled by customers and partners alike. As the global...

2014-01-06 12:31:44

Light Cyber's MAGNA detected breaches from new Bitcoin mining malware some four days before the campaign became widely known, proving the system's superiority in detecting and containing breaches from unknown malware early in the attack life cycle RAMAT GAN, Israel, January 6, 2014 /PRNewswire/ -- Light Cyber (http://www.lightcyber.com), an emerging provider of innovative Predictive Breach Detection solutions, today announced that its customer-installed MAGNA appliances were...

Yahoo's Advertising Servers Infiltrated By Malware
2014-01-06 04:39:35

redOrbit Staff & Wire Reports - Your Universe Online Internet surfers visiting Yahoo.com over the past few days have reportedly been exposed to malware distributed by a third party through the web portal’s advertising servers. According to Washington Post blogger Timothy B. Lee, two Netherlands-based computer security firms – Fox-IT and Surfright – have confirmed the presence of the malicious code, which “appears to be the work of malicious parties who have hijacked Yahoo's...

UK Hackers Raid ATMs With USB Sticks, Add Money-Making Malware
2013-12-31 13:49:32

Peter Suciu for redOrbit.com - Your Universe Online Cybercriminals in Europe are reportedly targeting cash machines using USB drives. The thieves cut holes in the fascia to access a USB port and then uploaded malware to the machines. This allowed the thieves to essentially empty the cash machine at their convenience. These attacks, which actually occurred last summer, were disclosed at this week’s annual Chaos Computing Congress in Hamburg and reported by several European news...

2013-12-31 12:22:51

OTTAWA, Dec. 31, 2013 /CNW/ - With Trend Micro cyber threat analysts predicting that individuals, businesses and governments will face a proliferation of sophisticated digital threats in 2014, New Years is the perfect time to choose a few simple resolutions to keep you and your personal information safe. "Unlike hitting the gym everyday, committing to lead a safer and healthier online life is among the simpler New Year's resolutions to keep. A few minutes of your time and the...

NSA Intercepting Computer Deliveries, Implanting Spyware: Report
2013-12-30 12:27:43

Gerard LeBlond for redOrbit.com - Your Universe Online According to a report Sunday from the German publication Der Spiegel, a special hacking unit from the US National Security Agency (NSA), intercepts deliveries of new computer equipment and plants spyware. The Office of Tailored Access Operations (TAO) is one of the NSA’s most successful operations for infiltrating computer systems. Der Spiegel wrote, “If a target person, agency or company orders a new computer or related...

2013-12-30 08:29:04

RALEIGH, N.C., Dec. 30, 2013 /PRNewswire/ -- Here's how an attack from the Cryptolocker virus unfolds: when you attempt to access your business computer network, you instead find yourself locked out and all files strongly encrypted. Next, a threatening message arrives, and a faceless entity demands a ransom before lifting the encryption. It's a nightmare scenario, but one that Petronella Technology Group knows how to stop dead in its tracks. More information on this critical threat,...


Latest Malware Reference Libraries

0_173bb487cd480e12bc1008c4301cd186
2013-03-16 00:00:00

A wiki is simply a website that allows the users to create and edit any number of interlinked web pages through a simplified markup language. They are often powered with wiki software and used to collaborative wiki websites, power community websites, for note taking, and in knowledge management systems. Some wikis serve specific purpose while others are more of an open content format. Wiki, meaning fast in Hawaiian, was first created by Ward Cunningham who developed WikiWikiWeb. Wikis...

More Articles (1 articles) »
Word of the Day
drawcansir
  • A blustering, bullying fellow; a pot-valiant braggart; a bully.
This word is named for Draw-Can-Sir, a character in George Villiers' 17th century play The Rehearsal.
Related