Wednesday, September 14th, 2011
Researchers have discovered what is believed to be the first in-the-wild rootkit that targets BIOS, the built-in software responsible for booting up a computer and managing communication between the machine and its attached devices.
The discovery of Mebromi is notable not because any widespread infections are anticipated – the complexity of ...
Posted in Hardware, Security | No Comments
Thursday, August 25th, 2011
Researchers have uncovered evidence that the infamous Zeus login-stealing Trojan has been blended with the Ramnit worm to create hybrid malware that can attack online bank accounts while spreading across networks.
Security company Trusteer said it recently discovered a mutant version of Ramnit that appeared to be using a man-in-the-browser (MitB) ...
Posted in Internet, Privacy, Security | No Comments
Thursday, August 18th, 2011
Security company Damballa has revealed that the source code for SpyEye, one of the most dangerous banking Trojans around, has been leaked online. Which is good for researchers, as they can better understand how it works. But it also means that a malware kit which used to cost more than ...
Posted in Internet, Privacy, Security, Software | No Comments
Tuesday, August 16th, 2011
Several days ago, one of our customers submitted a sample (SHA1: fbe71968d4c5399c2906b56d9feadf19a35beb97, detected as TrojanDropper:Win32/Vundo.L). This trojan hijacks the hosts “vk.com” and “vkontakte.ru” (both social networking sites in Russia)and redirects them to 92.38.209.252, but achieves this in an unusual way.Source:https://blogs.technet.com/b/mmpc/archive/2011/08/10/can-we-believe-our-eyes.aspx
Posted in Internet, Linux, Privacy, Security, Windows | No Comments
Tuesday, April 12th, 2011
A new Trojan tries to extort money from users by convincing them to dial international telephone numbers to reactive Windows, a security researcher said today.
Once on a PC, the malware displays a message claiming that Windows is "locked" and must be reactivated, said Mikko Hypponen, the chief research officer of ...
Posted in Internet, Security, Windows | No Comments
Page 7 of 28« First«...56789...20...»Last »