Malwarebytes sees signs of possible Trojan-based blackmail
The stage may be being set for a significant campaign of malware-facilitated blackmail, according to the regional head of Malwarebytes.
The stage may be being set for a significant campaign of malware-facilitated blackmail, according to the regional head of Malwarebytes.
Symantec has seen an increase in cyber criminals directly attacking financial institutions such as banks using Trojans.
A new kind of Android malware can steal online banking credentials and hold a device's files hostage for ransom, delivering a particularly nasty one-two punch.
The security issues affecting businesses are similar around the world. Most involve employees innocently bringing an infected personal mobile device into the corporate network, or clicking on a social media link that looks harmless but hides a Trojan or worm that will secretly steal data and money and, potentially, remain undetected with severe impact on security of the infected device.
European ‘hacker club’, the Chaos Computer Club, has claimed to have reverse engineered a sample of German authorities’ lawful intercept malware, Quellen-TKÜ, and found that besides eavesdropping on Skype conversations it also captures screenshots and logs keystrokes.
A reader asked the Answer Line forum how she can remove a Trojan from an infected .dll file called infamiqayoq.dll. Her security software quarantined the file, but now she gets an error message every time she boots.
Former Apple Macintosh evangelist Guy Kawasaki posts Twitter messages about a lot of different things, but the message he put up on Tuesday afternoon was really out of character.
In this white paper we will: • Summarize the decline of Phishing 1.0. • Discuss how phishing has turned toward business and become more costly. • Outline the structure of new Phishing 2.0 attacks. • Delineate how the new campaigns evade standard antiphishing countermeasures. • Describe how web security services with real-time antiphishing capabilities can protect against Phishing 2.0 attacks.