Malware RSS Feed
Don't believe your eyes but check if you still have your AV solution. Instead of fighting AV detections, cybercriminals from Brazil just replace them with their own fake solutions.
This fifteenth of 19 blog posts about the fourth edition of the Common Sense Guide to Mitigating Insider Threats describes Practice 15: Implement secure backup and recovery processes.
Following in the wake of the vOlk (Mexico) and S.A.P.Z. (Peru) botnets comes PiceBOT, a newbie to the Latin American cybercrime scene. The cost on the black market is currently around $140.
This fourteenth of 19 blog posts about the fourth edition of the Common Sense Guide to Mitigating Insider Threats describes Practice 14: Develop a comprehensive employee termination procedure.
Users of inexpensive Android smartphones typically look for ways to accelerate their devices, for example, by freeing up memory. Demand for software that makes smartphones work a little faster creates supply, some of which happens to be malicious. In addition to legitimate applications, apps that only pretend to clean up the system have appeared on Google Play.
Vulnerable programs are among the most commonplace ways to attack victims and steal personal data.
If your computer has not been protected with anti-virus software and has been infected with malware, you will need to take the following actions to delete this: Delete the original program file (its...
A trojan program. It is a Windows application (PE-EXE file). 742912 bytes. Packed by an unknown packer. Unpacked size - around 788 kB. Written in Delphi. Installation When launching, the...
The malicious library exports the "testall" function which leads to the following actions being carried out. If the system launches the "avp.exe" process, the trojan tries to download the following...
Google Chrome users are being targeted in these days by a wave of attacks that uses malicious extensions hosted in the official Chrome Web Store
The malicious library is a component of a trojan program designed to steal the user's authentication data. It is a Windows dynamic-link library (PE-DLL file). 8192 bytes. Written in C++.
A trojan program that uses the vulnerabilities in Oracle Java and Adobe Reader/Acrobat products to download and launch other malware. It is a HTML document containing Java Script. 88200 bytes.
A trojan program that uses the vulnerabilities in Oracle Java and Adobe Reader/Acrobat products to download and launch other malware. It is a HTML document containing Java Script. 88518 bytes.
This thirteenth of 19 blog posts about the fourth edition of the Common Sense to Mitigating Insider Threats describes Practice 13: Monitor and control remote access from all end points, including mobile devices.