Report: NSA not only creates, but also hijacks, malware
In addition to having its own arsenal of digital weapons, the U.S. National Security Agency reportedly hijacks and repurposes third-party malware.
Lucian Constantin | 20 Jan | Read more
In addition to having its own arsenal of digital weapons, the U.S. National Security Agency reportedly hijacks and repurposes third-party malware.
Lucian Constantin | 20 Jan | Read more
A sophisticated group of cybercriminals has stolen over US$25 million by hacking into the infrastructure of numerous financial institutions in Russia and former Soviet Union countries, as well as into point-of-sale systems belonging to U.S. and European retailers.
Lucian Constantin | 23 Dec | Read more
A new computer Trojan based on the infamous ZeuS banking malware is targeting users of over 150 banks and payment systems from around the world, security researchers warn.
Lucian Constantin | 20 Dec | Read more
The criminals responsible for a recently-discovered piece of ransomware called VirRansom have raided the dirty tricks locker and pulled out a technique experts assumed was extinct – old-fashioned virus-like replication.
John E Dunn | 17 Dec | Read more
A newly discovered malware program designed to infect Linux systems is tied to a sophisticated cyberespionage operation of Russian origin dubbed Epic Turla, security researchers found.
Lucian Constantin | 10 Dec | Read more
For the past two years, a team of Iranian hackers has compromised computers and networks belonging to over 50 organizations from 16 countries, including airlines, defense contractors, universities, military installations, hospitals, airports, telecommunications firms, government agencies, and energy and gas companies.
Lucian Constantin | 03 Dec | Read more
A variant of the Remote Control System (RCS) malware developed by an Italian company called Hacking Team is masquerading as a bookmark management application called Linkman, according to the main developer of a new malware scanning tool.
Lucian Constantin | 27 Nov | Read more
Attackers have started using the Citadel Trojan program to steal master passwords for password management applications and other authentication programs.
Lucian Constantin | 21 Nov | Read more
A free tool released Thursday allows users to scan their computers for surveillance malware that has been used in attacks against journalists, human rights defenders and political activists around the world.
Lucian Constantin | 20 Nov | Read more
A malware program distributed recently through a rogue server on the Tor anonymity network was also used in targeted attacks against European government agencies.
Lucian Constantin | 15 Nov | Read more
For the first time since Stuxnet was discovered in 2010, researchers have publicly named the worm's original victims: five Iranian companies involved in industrial automation.
Lucian Constantin | 13 Nov | Read more
For the past four years a group of sophisticated hackers has compromised the networks of luxury hotels to launch malware attacks against corporate executives and entrepreneurs traveling on business in the Asia-Pacific region.
Lucian Constantin | 11 Nov | Read more
Attackers have used rogue applications for both OS X and Windows to infect iPhones and iPads in China with a malware program that steals contact information and other private data.
Lucian Constantin | 08 Nov | Read more
A cyberespionage group that has built its operations around a malware program called BlackEnergy has been compromising routers and Linux systems based on ARM and MIPS architectures in addition to Windows computers.
Lucian Constantin | 05 Nov | Read more
Since 2011 a group of attackers has been targeting companies that operate industrial control systems with a backdoor program called BlackEnergy.
Lucian Constantin | 30 Oct | Read more