Articles about Malware

How to protect yourself against ransomware

ransom note

Regardless of whether you’ve been hit with ransomware or not, protecting your network from these types of attacks is now an integral part of any network security framework for both individuals and companies. Protecting yourself from intrusions and attacks requires securing your main layers of defense by utilizing Security Awareness Training and antivirus/anti-phishing software.

If you consider a computer network (even a simple one, like your home computer) to consist of a series of layers that any malware or virus needs to penetrate, the outermost layer would consist of your users themselves. After all, it takes a user’s interaction in order to initiate or allow a network intrusion. Only AFTER a user has clicked or visited a malicious link, will your secondary and tertiary layers (firewalls and antivirus) come into play. Thus, the very first layer you will need to harden is that of the human operator. It is only in recent years that the importance of this layer of security has come to be recognized. In the past, software has been relied upon as a catch-all for these types of situations. Software just by itself is not enough anymore, users must be trained to prevent such attacks from happening in the first place.

Continue reading

Avira wins case upholding its right to block adware

gavel

Security firm Avira has won a court case that can not only be chalked up as a win for consumer rights, but could also set something of a precedent. German company Freemium.com took Avira to court for warning users about 'potentially unwanted applications' that could be bundled along with a number of popular games and applications.

Freemium.com downloads included a number of unwanted extras in the form of browser toolbars, free trial applications, adware, and other crapware. Avira's antivirus software warned users installing such applications; Freemium took objection to this and filed a cease and desist letter, claiming anti-competitive practices. But the court ruled in Avira's favor, saying it could continue to flag up and block questionable software.

Continue reading

Android is the biggest target for mobile malware

virus malware infection mobile

Most of the malicious software for mobile devices targets Google’s Android operating system, a new report by Pulse Secure says.

Last year, almost one million individual malicious apps for Android were released, according to Pulse Secure’s Mobile Threat Report. That means the number of threats quadrupled in comparison to the year before.

Continue reading

Windows 10 will keep you safe from malware

security hand

Microsoft’s past attempts at protecting Windows users from malware have been patchy at best. However, with Windows 10 the company is offering a new way to help protect its customers from dynamic script-based malware and other forms of cyberattack.

AMSI (Antimalware Scan Interface) is an interface standard that allows applications and services to integrate with any existing antimalware product on your PC. Those apps can call the new Windows AMSI APIs at any time to scan for malware.

Continue reading

Adware spreading through Skype links

skype_logo

Skype users, beware. There are nefarious links being spread around through Skype, and if you click them you will be presented with a lot of adware. However, there are good news, and bad news here.

Researchers at the security behavior management company PhishMe have identified a campaign in which Skype was used to distribute adware, SC Magazine reported on Wednesday.

Continue reading

New ransomware says you've been watching porn on your Android device

mobile security

Ransomware has become big business these days, with high-profile cases affecting computer users. Up until now though, mobile users have remained relatively safe from that particular form of infestation and only had the "garden variety" version of malware to contend with. That landscape is changing rapidly, it seems.

Security researchers at AVG have uncovered what they dub "Porn Droid". The infected device is locked by the "FBI" and the user gets a message demanding money in exchange for restoring the phone or tablet. To make the message particularly scary, it claims the offense is for child pornography.

Continue reading

Google Play hosts over 30 malicious Minecraft apps

virus malware infection mobile

Malware is still a worry on the Google Play store, even though the rate of malware is dropping to its lowest levels since the inception of the store in 2008.

One of the easiest ways to push malicious apps is by masquerading them under popular names, in this case Minecraft. Guides, tutorials, tricks and other apps would offer help, but quickly turn into a user’s worst nightmare with malware and adware spam.

Continue reading

The ILoveYou legacy -- how malware has changed in the past 15 years

Malware virus detected

Where were you when the 'ILoveYou' bug started spreading on 4 May 2000? Was your computer one of the tens of millions of PCs the Love Letter attacked?

Fifteen years ago, email messages with the subject line 'ILoveYou' and the message 'Kindly check the attached LOVELETTER coming from me' started propagating to millions of inboxes. The malware-laced attachment was named LOVE-LETTER-FOR-YOU.txt.vbs. Since the vbs extension was hidden by default, it seemed to recipients that the attachment was a harmless txt file. Once the attachment was opened, a VBS script would overwrite image files and send the LoveLetter email to all contacts in the victim’s Outlook address book.

Continue reading

Rombertik strikes! In 10 seconds, this computer will self-destruct

Rombertik strikes! In 10 seconds, this computer will self-destruct

Viruses can be a serious problem and they take myriad forms. Viruses have become increasingly sophisticated over the years, particularly in the methods used to try to evade detection. Now Cisco's Talos security researchers have discovered the Rombertik which goes to extraordinary lengths to avoid analysis.

Researchers managed to reverse-engineer the virus and found "multiple layers of obfuscation and anti-analysis functionality". One sample was found to include code that would destroy the MBR of the host computer if analysis or debugging is attempted.

Continue reading

Antivirus tool stripped of awards after cheating

Antivirus tool stripped of awards after cheating

Antivirus software produced by Qihoo 360 has been stripped of awards by three leading security testers after it was found to have cheated. AV‐Comparatives, AV‐TEST and Virus Bulletin discovered that Chinese company Qihoo 360 submitted one version of its software for testing, but then released a different one.

The publicly released version of the software had a key virus detection engine disabled, resulting in a lower level of protection for users. As a result of the findings, the security testing bodies are not only revoking any awards given to the software this year, but also calling for greater transparency so consumers know what they are getting.

Continue reading

Aggressive Android app ads annoy and interfere

Mobile app threats

Avoiding online ads can be fairly easily achieved by installing a tool such as AdBlockPlus, but it's a different matter when it comes to ads in mobile apps. Security researchers at Doctor Web have discovered that a number of Android apps found in Google Play are plagued with aggressive ad modules.

Advertising is considered aggressive if it appears on top of other windows, interferes with the use of applications, and makes normal use of a smartphone or tablet difficult.

Continue reading

You're more likely to be struck by lightning than hit by mobile malware

mobile lightning

We constantly see stories about the latest threat from malware, particularly relating to mobile devices. But is it really as bad as it's made out to be?

No, says threat detection and containment specialist Damballa which is unveiling new research based on its big data analysis of almost half of US mobile traffic.

Continue reading

It's your own fault phishing scams are successful

email_phishing

There is no need for cybercriminals to launch sophisticated attacks, or exploit vulnerabilities, to gain access to valuable information; a simple phishing email is all that's needed to convince a worrying number of people to hand over their login credentials. This is just one of the findings of a new security report due to be published by Verizon.

The telco reports that more than two thirds of security breaches involving phishing tactics. The number of people who fall for this type of scam means that phishing remains successful and popular as a means of extracting data from people. In this age of technological enlightenment, it might come as a surprise that more than one in 10 people who receive a phishing email open attachments or click the links they contain.

Continue reading

Windows remains vulnerable to serious 18-year-old SMB security flaw

Password threat

A serious security hole leaves millions of Windows users open to attack, making it possible to extract encrypted credentials from a target machine. Researchers at Cylance say the problem affects "any Windows PC, tablet or server" (including Windows 10) and is a slight progression of the Redirect to SMB attack discovered by Aaron Spangler way back in 1997.

Redirect to SMB is essentially a man-in-the-middle attack which involves taking control of a network connection. As the name suggests, victims are then redirected to a malicious SMB server which can extract usernames, domains and passwords. Cylance also reports that software from companies such as Adobe, Oracle and Symantec -- including security and antivirus tools -- are affected.

Continue reading

Dell diagnostic software getting flagged as malware due to security problems

hacker attack

Computers come with a lot of pre-installed software these days -- it's a trade-off for low pricing that forces OEMs to make deals with companies like McAfee, Norton and others. However, some of what comes with that new desktop or laptop is actually there to help you. Dell pre-installs diagnostic software to aid in a problematic situation.

Apparently Malwarebytes doesn't see it that way. The security software is recognizing this as a problem for your system -- and it is, or was. The problem is that older versions had a vulnerability that could allow malicious code execution. Dell has since updated its software to close the hole, which was recently discovered by a security researcher.

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.