Malware
The malware hits keep coming. Just as the defenses there are new attacks via spyware, adware, viruses and worms. Keep current with the latest threats, which are increasingly creative.
-
The vulnerability affects the Win32k TrueType font parsing engine and allows hackers to run arbitrary code in kernel mode
-
Three of the bulletins carry "remote code execution" risk while the fourth exposes Windows users to denial-of-service attacks.
-
Symantec has traced the attacks back to a 20-something male located in the Hebei region in China.
-
One version of the attack was triggered by a rigged Microsoft Word .doc that probably included some social engineering and required the target to open the booby-trapped file.
-
Is there a Hacker Gene? Is the hacker personality a learned set of behaviors? Research suggests that both are at work.
TechRepublic Discussions
- 20Video: Five tips for troubleshooting a slow PC
- 10Clean infected machines
- 8Review: Ashampoo Anti-Malware application
- 4Cant seem to find this virus / malware
- 2IE in Windows XP Mode
- 97Invincea Browser Protection: Using the power of virtualization to combat malware
- 5Updating Malware Bits & Bytes on an infected computer
-
New Mac OS X malware with DDoS functionality spotted in the wild
Security researchers from multiple companies, have spotted a new Mac OS X malware. Dubbed 'Tsunami', the malware's primary goal is to act as platform for executing distributed denial of service...
-
Hungarian Lab found Stuxnet-like Duqu malware
The Laboratory of Cryptography and System Security (CrySyS) in Hungary confirmed its participation in the initial discovery of the Duqu cyber-surveillance Trojan.
-
New Mac OS X malware disables Apple's malware protection
Security researchers from F-Secure have spotted a Mac OS X malware that disables Snow Leopard's XProtect.plist antivirus signatures updates.
-
Spamvertised 'Cancellation of the package delivery' emails serving malware
Security researchers from Sophos have intercepted a currently spamvertised malware campaign, impersonating the Royal Mail office.
-
Can reputation systems protect you from unsafe, buggy software?
Before you install a new program on any PC, smartphone, or tablet, you should ask two questions: Is it safe? Is it reliable? Most people don't ask those questions at all. And even when they do,...
-
-
Which is the most popular malware propagation tactic?
According to Microsoft's recently released Security Intelligence Report, that's socially engineered malware, malware requiring user interaction such as campaigns enticing users into downloading...
-
'Steve Jobs Alive!' emails lead to exploits and malware
Security researchers from M86 Labs have intercepted a currently spreading malware campaign using Steve Jobs as a social engineering theme.
-
Malware Watch: U.S Chamber of Commerce official letter; DHL delivery error, IRS notifications
In this week's Malware Watch we'll profile three currently active and spreading malware campaigns.
-
If your PC picks up a virus, whose fault is it?
Want to avoid being attacked by viruses and other malware? Two recent studies reveal the secret: regular patching. A fully patched system with a firewall enabled offers almost complete protection...
-
iPhone 5 themed emails serve Windows malware
Researchers from Sophos have intercepted a currently spamvertised malware campaign.
-
Facebook partners with Websense to scan URLs for malware
Facebook has added another layer of security to fight malware on the social network. The company has partnered with Web security gateway software company Websense to check links its users post.
-
Hackers using QR codes to push Android malware
Once a user scans the QR code, the code redirects them to a site that will install a Trojan on their Android smart phones.
-
Apple blocks malware-as-PDF threat but new attack emerges
Even as Apple adds detection to block a Mac OS X malware threat, researchers find new Mac malware posing as a legitimate Flash Player installation package.
-
New Mac trojan found hidden in PDF file
A newly discovered Mac vulnerability disguises itself as a PDF to trick users into opening it, which installs an Apache server on your Mac. Luckily it hasn't been weaponized. Yet.
-
Researchers find Mac OS X malware posing as PDF file
The malware installs a backdoor that contacts a remote server for instructions and can be used to steal files or capture a screenshot of the infected computer system.
-
Google busts itself for distributing malware
Who says Google favors its own properties? When the company's Safe Browsing service checked Google.com, it found that 50 pages resulted in malicious software being downloaded and installed without...
-
Spamvertised 'We are going to sue you' emails lead to malware
Security researchers from WebSense have intercepted a currently active and circulating malicious spam campaign.
-
Spamvertised 'Facebook notification' leads to exploits and malware
Security researchers from M86 Security Labs, have intercepted a spamvertised malware campaign using bogus Facebook notifications as a social engineering element.
-
Malware Watch: FDIC and Western Union themed emails lead to malware
Security researchers from Sophos, have intercepted two currently active and circulating malware campaigns.
-
Spamvertised 'Scan from a Xerox WorkCentre Pro' leads to malware
Sophos have intercepted a currently circulating malware campaign, enticing users into downloading and executing malicious file attachments.
The best of ZDNet, delivered
ZDNet Newsletters
Get the best of ZDNet delivered straight to your inbox
Facebook Activity
White Papers, Webcasts, & Resources
- Webcast: 10 Benefits of Next Generation Network Security Strategies Check out this webcast to learn the top ten benefits to next generation network security strategies. Discover how modernizing your computing can start with security. Download Now
- Increase E-Commerce Revenue With New Techniques in APM Read this white paper to learn how Zappos.com used a next-generation APM sytem to improve e-commerce application performance and find out the top 10 questions to ask when optimizing your... Download Now
- Battery Technology for Data Centers and Network Rooms: Ventilation Back-up power for computers in the form of batteries is still seen as a necessity. However, these batteries are far from your standard double As and require their own ventilation. Read this white... Download Now






