Posts Tagged ‘Malware’

Ways Malware Can Impact BusinessesMalware is one of those things that can sneak imperceptibly onto your computer, but the results can be catastrophic. According to a report on cybersecurity, malware has infected nearly 20 percent of enterprise computers.

One of the biggest reasons for infiltration is poor password security, and many enterprise companies allow contractors and third-party vendors direct access to their website. It’s a serious issue, but basic two-factor authentication and other methods can prevent most malware, so let’s review how malware can affect your business. (more…)

Cyber securityA botnet, called Qbot, to have infected over 500,000 systems.

Proofpoint security researchers have published an analysis that exposes the inner workings of a cybercrime operation targeting online banking credentials for banks in the United States and Europe.

According to Proofpoint, attacks by type drive-by-dovnload carried out with the help of compromised sites on the WordPress platform. (more…)

mobile threatsClones and compromised legitimate apps are a concern for mobile users

Cybercriminals continue to attack mobile phones through new and devious tactics, using both malicious clones and legitimate apps as bait.

We’ve stepped into the technologically advanced future that we grew up hearing about for quite some time now and so far it has been great. Unfortunately, the cybercriminal lot is determined to spoil the fun for all of us. After haunting computer machines, primarily Windows computers, for over a decade, they seem to have turned much of their attention to smartphones, the Michael Jackson of technology (oh come on, who doesn’t love the moon-walking King of Pop?). Giving a completely new meaning to communications and entertainment, the cell phones of today leave very little to be desired, except for maybe a force-field to deflect all the malware targeting them. As if the situation wasn’t bad enough already, McAfee Labs has revealed in its quarterly threat assessment that cybercriminals are targeting mobile devices in newer and smarter ways than before. (more…)

MalwareMalware, viruses, bot injection, DDoS attacks ad infinitum. For years now they have been the bane of webmasters, company executives and owners around the world.

With the annual damage from malware alone exceeding $13 billion, to date there has been no solution to predict if an attack is coming your way or if your website is on the “target list”.

New technologies in corporate internet security monitoring are changing this, with dark spiders which can now crawl the full spectrum of the cyber criminal chatter network to see if your company website, name or even key staff names are on a list somewhere. (more…)

Malware RemovalThe 5 Best Malware Removal Programs For You And Your Business Or Personal Computer.

Malware and viruses are known to disable computers and other electronic devices. Finding out what are the top five malware removal programs will be a relief for most users. If you have ever watched your computer crash from entering an infected site, you understand the need for good malware. Computer protection software from viruses, rooks and malware is critical if you operate on the Web. What are the top five malware removal programs? Many who have had the misfortune of encountering these inconveniencing viruses have asked this question. Well, now your question is solved. Here are the top five-malware removal programs. (more…)

ESET LogoResearchers has discovered ‘Zeus-like Trojan‘.

ESET’s researchers has discovered a new effective web banking Trojan – Hesperbot (Win32/Spy.Hesperbot), whose activities are aimed at users from Turkey, the Czech Republic, Portugal and UK.

Malicious software can capture keystrokes, take screenshots with the user’s screen , record video , and configure proxy and create a hidden VNC- server on the infected system.

Hesperbot spreads by sending out phishing emails and often tries to infect mobile devices that operate on the basis of Android, Symbian and Blackberry. Experts notes – the functionality of the new malware is reminiscent of another well-known banking Trojan – Zeus. (more…)

Twitter hackedThe attack can be achieved by the introduction of Javascript code in your account page in the social network.

In one of the most popular social networks Twitter world was discovered malware aimed at social network users. This was reported by Tanya Shafir,  Trusteer’s researcher.

As declare in the company, the malicious software carries out MitB-attacks, using the web browser of the infected computers thanks to what get access to the account to Twitter from which the attackers and spread malicious entries. (more…)

Malware Trojan Horse

using the mouse to hide itself

The company Symantec announces new Trojans that embeds malicious code in your command will be executed when the mouse event handling. The virus can bypass the automated detection of threats, since its work no one uses the mouse.

According to data provided by the experts, this Trojan starts its work after a period of time in which not using the mouse. In particular, the malicious program unpacks his malicious code in 5 minutes, then waiting another 20 minutes, and added to the registry. Trojan network activity starts another 20 minutes later. This tactic allows the virus to remain undetected.

Another variant of the malware uses the Windows API – SetWindowsHookExA – to embed itself into the function that is responsible for the processes of the mouse. In normal operation, the Windows user sooner or later will make some action with the mouse and thereby activates a Trojan. (more…)

Symantec CorpVirus writers have created a monthly basis for some 33 malware in 2011.

According to Symantec, in 2011, was found 400 examples of malware that can bypass the automated malware analysis.

“If malware can hide itself from the automated analysis of the threats, they can mingle with millions of other files, and anti-virus software will not calculate them” – said representatives of Symantec.

Malware authors supply their development mechanism to detect the sandbox. In particular, such mechanisms include “registry scan”, “check the video drivers”, “use of special programs in assembly language” as well as the mechanism of “check-defined process.” (more…)

Malware Trojan HorseFlashback is an example of malicious software that allows cyber criminals can steal passwords and other sensitive information from the infected computer. The system can be compromised when visiting malicious Web sites. Said Trojan was the first large-scale real threat faced by owners of “Poppy.” Despite the fact that the application uses a vulnerability in the Java, and not in OS X, in 98% of his victims were just Mac-system.

If you go to an infected site that is hosting Flashback, the program will attempt to show you a trained applet Java. If you have a version of the Java vulnerability and it is enabled in your browser, the malicious code will infect your system and install a specific set of components. Since Apple released the first update for this vulnerability only 3 April and 6 April issued a second update, at the moment a large number of Mac is still at risk of infection. (more…)