Latest Malware news.

This malware tracks your audio by remotely controlling PC microphones

CyberX announced that it had discovered a massive cyber-reconnaissance operation, Operation BugDrop that attackers were carrying out in a number of targets in Ukraine. This fairly recent attack eavesdrops on sensitive conversations by remotely controlling PC microphones – in order […]

Over 140 enterprises worldwide hit with this Fileless Malware

A malware attack or even an attempt is much like an aircraft crash, in both the investigators need to look for the clue on why it actually happened. Analogous to the black box in the aircraft, security researchers try to […]

Ransomware

Fewer Malware being released now, but Ransomware is on the rise

According to a report published by Network security company, SonicWall, there was a decline in the Malware attacks in 2016, however at the same time Ransomware attacks multiplied by hundreds. Statistics reveal that unique malware samples collected fell to 60 […]

Exploit Kit activity pose a major threat to outdated software worldwide

Analyzing the monthly encounters of Exploit Kit in 2016, Microsoft has said that they pose a major threat to the PCs running unpatched software. The past year saw attackers using exploit kits to inflict some of the most prominent threats […]

New Ticno Trojan installs unwanted software and unremovable ads

The number of malicious programs and malware is constantly on a rise. Furthermore, the apps that are designed to be installed with other programs have also been one of the most preferred ways for virus makers to deploy their payload. […]

msrt-soctuseer

MSRT will now detect and removes browser modifier malware – Soctuseer

MSRT November 201 update (Microsoft Malicious Software Removal Tool) now brings help for Soctuseer victims in this month’s release. MSRT now removes the annoying Soctuseer installations and reverses the system modifications with the help of new detections. Microsoft now adds […]

Office 2013 will now be able to block Macros

Office 2013 now has the protection against Macro-based malware attack. Seeing the significant increase in Macro-base infections lately Microsoft has added the macros blocking feature in Office 2013 which blocks Macro virus from loading in the high-risk scenarios. While this […]

fake-microsoft-security-essentials-installer

Microsoft warns of fake Microsoft Security Essentials installer

Protecting your computer from malware has become a major hassle these days, with almost every software having malware-filled clones in the market. But, the irony here is that we now have a fake Microsoft Security Essentials Installer, which is essentially […]

Microsoft notices uneven rates of malware infections around the globe

Malware is a huge issue for Microsoft with its business based solely on software. Their bi-annual Security Intelligence Report (SIR) just came out and it shows the intensity of malware attacks from different parts of the world. The company releases […]

Microsoft-Cyber-Security

Checkpoint Security warns enterprise of 9x increase in malware

Checkpoint has published its latest findings from the two research projects, the Check Point 2016 Security Report and the Exploits at the Endpoint:SANS 2016. The reports further reveal the critical challenges and also recommendations for the organizations to buckle up […]

Windows Trojan that fakes Chrome browser neutralized

Dr. Web, an IT security solution vendors have discovered a new Trojan  virus meant for Windows system called Trojan.Mutabaha.1, this Trojan is aimed at misleading the users by installing fake Chrome browsers and also poses ability to replace advertisements on […]

Pay-Per-Install

Google investigates Pay-Per-Install and Unwanted software installs

In collaboration with New York University’s Tandon School of Engineering, Google investigated the perils of Pay-Per-Installs leading to unwanted software installation. Coming out with a report after a year of study on unwanted software distribution, Google found that the Pay-Per-Install […]

Worrying changes in the European Union Threat Landscape

IT security professionals try building high-performance security tools keeping in view the changing nature of the threat landscape. However, they note two fundamental issues have stayed constant. First, the threat landscape continuously evolves and gains sophistication. Second, attackers remain a […]

IBM Security uncovers GozNym malware, a Trojan targeting bank accounts

According to a recent report from CNBC, the IBM Security team has uncovered a serpent-like Trojan called as GozNym. The GozNym malware targets banking accounts and it remains asleep until the user starts logging into his bank account using net […]

Malware misuses the Windows God Mode to hide itself

God Mode, the hidden Windows tweak is the latest to be used by hackers and malware writers to hide malware on Windows computers. Cyber criminals are now placing files inside this master control panel, commonly called as GodMode to redirect […]

Microsoft Security Intelligence Report

Indonesia, Pakistan on top in malware attacks, according to Microsoft

According to the latest Microsoft Security Intelligence Report, Pakistan, Indonesia, the Palestinian territories, Bangladesh, and Nepal are some of the Asian countries, where the highest number of malware attacks is reported. Microsoft’s team uploaded this report on its ‘Microsoft Security […]

USB Thief

Deadly USB-based data stealing malware discovered

Antivirus firm ESET has discovered a unique Trojen program dubbed as the USB Thief that is almost undetectable and is designed to steal information from PC’s not connected to the internet. Win32/PSW.Stealer.NAI or the USB Thief is hugely different compared […]

SSL/TLS vulnerability

Microsoft details how it defends against persistent attackers

With the rise in Cyber threats Microsoft has been striving hard to neutralize the same by introducing new security initiatives at regular intervals. It was for this very reason that Microsoft killed the RC4 Cipher recently. Microsoft Malware Protection Center […]

Samas Ransomware

Samas changes the way a Ransomware operates

A typical ransomware is a threat affects consumers and enterprise the same way.  Basically, it’s a malware used as an exploit kit campaign, a payload to spam email, or a macro malware. It prevents the users to access their data […]

New Linux Trojan takes Screenshots and Records Audio

A recent report released by Doctor Web has detected a new Trojan for Linux users. The Trojan named as the Linux.Ekocms.1 reportedly takes the screenshots, download different files on the compromised machine and helps the hackers spy on the users. […]

Brain, the first PC Virus turns 30 today

The transfer process of virus is much sophisticated today. Earlier, it was pretty simple! Business people who traveled the world with floppy disks in their briefcases could infect the computers on which they used the disks. BRAIN was the first […]

First JavaScript ransomware, Ransom32 discovered

The SaaS model has been picking up the pace and is considered as one of the best platforms to conduct businesses, however, on the other hand, this has also given rise to a large number of malware writers and cyber […]

Major WordPress sites including Readers Digest infected by malware

A majority of content-centric sites across the Internet are running on WordPress. There are reports that the Angler exploit kit has compromised many WordPress sites either directly or indirectly. The attack was carried out by injecting a malicious script within […]

Buhtrap malware distributed via Ammyy website

The security researchers at ESET discovered that visitors to the Ammyy website, somewhere in late October were being served up malware along with the popular and portable Ammyy Admin Remote Desktop Software that allowed the Buhtrap gang to gain control […]

Yahoo affected by malvertising attack

Cybercriminals use different methods to gain access to your computers in a hope to get information they can use for their benefits. Most of the Internet users think that cybercriminals’ activities are limited to smaller websites only. But this proved […]

Microsoft Word Intruder: Malware with a difference

The programs used to create malicious documents that exploit vulnerabilities in Office applications such as Word are now being advertised in underground forums. One such new tool that has recently come up offers the ability to track the effectiveness of […]