Friday, February 6th, 2015
A malware program designed for Linux systems, including embedded devices with ARM architecture, uses a sophisticated kernel rootkit that's custom built for each infection.
The malware, known as XOR.DDoS, was first spotted in September by security research outfit Malware Must Die. However, it has since evolved and new versions were seen ...
Posted in Internet, Linux, Security | No Comments
Thursday, January 22nd, 2015
Mobile banking is an increasingly popular way to stay on top of one’s finances, with the ability to check balances, transfer money and even deposit checks virtually. Unfortunately, the sector is also a rich tapestry of criminal activity, with 11% of mobile banking apps categorized as “suspicious.”
According to research findings ...
Posted in Internet, Mobile, Privacy, Security | No Comments
Tuesday, January 13th, 2015
Remember when we discussed how passwords were dead? If you needed more proof that this is true, the bad guys have you covered with a new piece of malware that turned up in the wild.
SecureWorks, the security arm of Dell, has discovered the new piece of malware dubbed "Skeleton Key." ...
Posted in Internet, Security, Windows | No Comments
Thursday, January 8th, 2015
Apple products have long enjoyed a reputation for superior security in relation to Windows systems, but a new proof-of-concept malware delivery method could put a serious dent in that reputation. The exploit, dubbed Thunderstrike, currently can’t be detected or removed by any known process without using specialized hardware. Security researcher ...
Posted in Hardware, Internet, Privacy, Security | No Comments
Wednesday, December 17th, 2014
Most ransomware has a binary file that needs to be executed before it can infect your PC. Ransomware usually relies on social engineering or exploits to infect unsuspecting users. However, some malware authors are bypassing this requirement with a new trick - browser lockers.
Unlike traditional ransomware threats that lock the entire desktop, ...
Posted in Internet, Security, Windows | No Comments