Articles about Malware

Enterprises gear up to face the inevitability of cyber attacks

business security

A new study finds that while attacks increase and financial losses continue to mount, a growing number of companies are preparing to respond to breaches

The research from forensic security company Guidance Software finds that 54 percent of organizations feel well prepared to respond to a major breach in the coming year (up from 51 percent in 2016). Additionally, 25 percent of respondents say they're looking to build a formal security and incident management team within the next year up from 12 percent in 2016.

Continue reading

Businesses spend $2,300 to deal with a malware attack

Hackers laptops

To remedy a malware attack businesses need to shell out, on average, $2,300 per attack. This is according to a new report by Arbor Networks.

The report, produced in partnership with research organization 451 Research, says spear phishing attacks are still most successful of all the different methods of entry.

Continue reading

Google Play fails to catch trojan-injected apps (again)

android-google-play-apps

Getting your Android apps through Google Play is considered safe, but there are times when even the search giant's store is dangerous. Case in point, Kaspersky uncovered two more trojan-infected apps that weren't removed until they had over 60,000 installs.

Kaspersky security researcher Roman Unuchek reports that, since September 2016, he has discovered "several dozen new malicious apps" on Google Play, all of which "were rooting malware that used exploits to gain root rights on the infected device." Obviously, Google failed to catch any of those in time either.

Continue reading

New report reveals how malware uses evasion to hide in plain sight

hiding in box

People have been hiding secrets in everyday objects for hundreds of years. The digital world is no exception, and McAfee Labs has released its latest Quarterly Threat Report, part of which looks at how evasion techniques can be used to distribute malware.

The use of evasion techniques started in the 1980s, when a piece of malware defended itself by partially encrypting its own code, making the content unreadable by security analysts. Since then a dark market for off-the-shelf evasion technology has developed and several contemporary malware families now make use of evasion techniques.

Continue reading

Malware attacks against UK businesses increase by 500 percent

malware alert

British businesses are being hit by more malware than ever, new research reveals.

In the wake of the huge WannaCry attack last month, an investigation by cybersecurity experts Malwarebytes found that malware incidents faced by UK businesses increased 500 percent year over year.

Continue reading

Trending 'Fireball' adware raises botnet concerns

Meteor

Last week, security researchers reported on a trending adware infection known as "Fireball". Sourced to the Chinese marketing firm Rafotech, reports indicate a footprint of more than 250 million infected machines worldwide. While the infection currently appears to only make changes to victims’ browser homepages and search engines, analysis suggests that the software could be remotely leveraged to act as a malware dropper.

If true, it’s possible that infected systems could be made part of a botnet and used to carry out new types of attack over the Internet.

Continue reading

Industroyer is more dangerous than Stuxnet

Industroyer

Remember Stuxnet, the worm that wreaked havoc across Iran's nuclear facilities? Security researchers from ESET say that they have discovered an even bigger threat, which is being called Industroyer.

According to the company's report, Industroyer is built to "disrupt critical industrial processes," and was recently used in an attack in Ukraine, causing the city of Kiev to lose power for an hour.

Continue reading

Ransomware attacks are becoming more sophisticated

Ransomware skull

Following the WannaCry attack last month, ransomware was one of the big topics at the recent Infosecurity Europe event in London.

The worldwide assault woke many businesses and organizations up to the real danger that ransomware poses, but new research has also discovered that the criminals behind such attacks could be gearing up for even bigger attacks soon.

Continue reading

People in the US are less savvy about cyber security than people in the UK

US v UK

A new report suggests that people in the UK are more aware of the terminology surrounding cyber security, and are less likely to fall victim to hacking and identity theft. Wombat Security Technologies' 2017 edition of its User Risk Report reveals a stark difference in cyber knowledge on either side of the Atlantic.

The report is based on a survey carried out last month into knowledge of, and attitudes to, cyber security topics and best practices. While the report shows that the UK is generally more cyber security savvy, the US is shown to fare better when it comes to passwords and backing up data.

Continue reading

Raspberry Pi devices transformed into cryptocurrency miners by Linux malware

raspberry-pi-3-model-b-board

The words "Linux" and "malware" don’t tend to belong in the same sentence, but a new strain called Linux.MulDrop.14 is infecting Raspberry Pi devices. Infected machines are used to mine cryptocurrency for the malware's author, and it take advantage of poor security to generate money from nothing.

The good news is that the malware is fairly simple, and its spread is dependent on the laziness of Pi owners.

Continue reading

New Android malware uses code injection to control devices

Mobile code injection

Researchers at Kaspersky Lab have released details of a new trojan being distributed via the Google Play store that is able to inject malicious code into the system runtime libraries.

Named Dvmap, the trojan is believed to have been downloaded from Google Play more than 50,000 times since March this year.

Continue reading

Chinese company Rafotech believed to be behind millions of malware infections

malware alert

According to extensive research from the Israeli cyber-security firm Check Point, a Chinese digital marketing company called Rafotech has infected millions of computers worldwide with adware that redirects user traffic to fake search engines.

The fake search engines then divert their search queries through Google and Yahoo's affiliate programs to earn a commission for the company behind the adware. So far Rafotech has infected over 250 million computers according to a rough estimation from Check Point.

Continue reading

New malware could be as dangerous as WannaCry

Network security

Security researchers have warned that more dangerous malware has been released from the recent NSA dump that resulted in the WannaCry ransomware outbreak.

Experts at Secarma have revealed that the attack could be hiding another malicious package, which could be as dangerous as WannaCry.

Continue reading

Gmail offers better malware and phishing protection for enterprises

Gmail

Google has updated Gmail with a number of new security features aimed at businesses that require better protection against malware and phishing scams.

The company announced today that it is bringing early phishing detection to its email service by using machine learning along with click-time warnings for malicious links found in emails as well as unintended external reply warnings.

Continue reading

Security experts warn about UK's nuclear Trident submarines: 'the vulnerability to cyberattacks is real'

trident-submarine-stamp

A report published by the British American Security Information Council (BASIC) cautions that the UK's fleet of Trident submarines faces "growing potential for cyber-attack." The authors issue a stark warning that "a successful attack could neutralise operations, lead to loss of life, defeat or perhaps even the catastrophic exchange of nuclear warheads."

Government officials have long dismissed the risk of hacking the nuclear subs because they are not connected to the internet. But the report, entitled Hacking UK Trident: A Growing Threat, suggests that risk of malware infection during manufacturing or software updating are just two possible attack vectors that could lead to the compromise of nuclear weapons.

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.