Articles about Malware

How pre-installed adware can cause trouble for mobile users

app frustration

New analysis carried out by Kaspersky of attacks on mobile devices has revealed that 14.8 percent of its users who were targeted by malware or adware in 2019 suffered a system partition infection, making the malicious files undeletable.

It also finds that pre-installed default applications have role to play, depending on the brand, the risk of applications that can't be deleted varies from one to five percent in low-cost devices and goes up to 27 percent in extreme cases.

Continue reading

Malware incidents decline 23 percent in 2019

declining graph

European managed security services company Orange Cyberdefense today reveals the findings of its inaugural Security Navigator, which shows a 23 percent decline in the number of recorded malware incidents in 2019.

The total number of security events have, however, increased. The company analysed 263,109 events from data obtained from its 10 CyberSOCs and 16 SOCs. Out of these events it identified 11.17 percent as verified security incidents. This represents a 34.4 percent increase over the previous year's rate of 8.31 percent.

Continue reading

Two thirds of malware is invisible without HTTPS inspection

unknown threat

A new report from WatchGuard Technologies shows that 67 percent of all malware in the first quarter of this year was delivered via HTTPS, so organizations without security solutions capable of inspecting encrypted traffic will miss two-thirds of incoming threats.

In addition, 72 percent of encrypted malware was classified as zero day (meaning no antivirus signature exists for it, and it will evade signature-based protections). The findings suggest that HTTPS inspection and advanced behavior-based threat detection and response solutions are now requirements for every security-conscious organization.

Continue reading

Fake job applications used to steal banking credentials

job resume

During May, researchers at Check Point have seen a doubling in the number of malicious files sent by email claiming to be resumes or CVs from individuals, as hackers exploit the unemployment and remuneration schemes resulting from the COVID-19 pandemic.

In addition they have noted that seven percent of domains registered containing the word 'employment' are malicious. There has also been a 16 percent increase in malware attacks overall, compared to March and April.

Continue reading

Excel vulnerability aids delivery of malware

Spreadsheet

Microsoft office files have long been used as a means of delivering malware payloads and researchers at Mimecast have discovered a rise in LimeRAT malware delivered using an Excel default password.

Excel files are designed to be easily encrypted, which helps attackers evade detection by common malware detection systems when a file is emailed.

Continue reading

Gift card scam sends out malicious USB drives

Giftwrapped USB

Malware attacks using USB flash drives dropped in offices or public locations like car parks are not uncommon. But researchers at Trustwave Spiderlabs have been investigating a new attack disguised as a gift card.

The attack came in the form of a letter that appears to be from retail chain Best Buy offering a $50 gift to loyal customers. With the letter comes a USB drive supposedly containing a list of items to spend the money on.

Continue reading

Click-fraud malware found lurking in more than 50 Play Store apps

Google Play icon

Researchers at Check Point have identified an auto-clicker malware family operating inside the Google’s Play Store.

Disguised in over 56 applications and downloaded over 1,000,000 times globally, the malware -- dubbed 'Tekya' -- commits mobile ad fraud by imitating the actions of a user, clicking ads and banners from ad agencies like Google's AdMob, AppLovin', Facebook, and Unity.

Continue reading

Cybercriminals exploit coronavirus fears to spread malware

Virus face mask

January's Global Threat Index from Check Point Research shows that Emotet remains the top threat for the fourth month in a row. But it’s now being spread by a spam campaign exploiting people's worries about the coronavirus.

The emails appear to be reporting where Coronavirus is spreading, or offering more information about the virus, encouraging the victim to open the attachments or click the links which, if opened, attempt to download Emotet on their computer. Emotet is primarily used as a distributor of ransomware or other malicious campaigns.

Continue reading

Mobile malware incidents increase by 142 percent

Mobile phone malware

According to a new study, 36.5 percent of all organizations have experienced a malware incident on a mobile device in the past year, which represents a 142 percent increase from 2018.

Research from mobile security specialist Wandera finds 57 percent of organizations have experienced a mobile phishing incident, with 60 percent of mobile phishing attacks occurring over HTTPS.

Continue reading

Foreign currency specialist Travelex suspends some services after cyber attack

Travelex

Travelex, the London-based foreign exchange company, has suspended some of its services and taken its UK website offline following a cyber attack that took place on New Year's Eve.

A malware infection caused the company to take the decision to cut the cord on its services. It said that this was merely a "precautionary measure" which was done "in order to protect data". The suspension of services has caused problems for customers around the world and has had a knock-on effect for other companies including Tesco Bank and Asda.

Continue reading

Malwarebytes AdwCleaner 8.0 unveils refreshed UI to better deal with pests

adwcleaner-200x175

Less than a month after unveiling MBAM 4.0, Malwarebytes has released Malwarebytes AdwCleaner 8.0, a major new version of its standalone adware-cleaning tool.

AdwCleaner 8.0 updates its optional in-app installer to ensure the latest version of Malwarebytes is installed going forward, plus drops support for Windows XP and Vista. Its UI has also been refreshed to chime with MBAM 4.0’s.

Continue reading

Malwarebytes 4.0 unveils the promise of better zero-day detection, 50 percent less CPU usage

malwarebytes-200x175

Malwarebytes has released a major new version of its eponymous anti-malware tool: Malwarebytes 4.0 is available now as a free and premium version for both Windows and Mac.

The new version unveils a major redesign with a look towards the minimalist. This reflects the promise of a much smaller footprint -- 50 percent less impact on the CPU during scans -- and associated performance gains. Malwarebytes 4.0 also unveils a brand new detection engine.

Continue reading

What are cyber threats?

security skull

A cyber threat is basically any type of threat that is computer related in nature. To be clear, a computer could be a desktop computer, a laptop, a tablet or even a smartphone. All of these devices have particular types of threats that they can be exposed to that users need to be aware of to ensure that they can protect themselves and their confidential information. 

Given the number of different types of devices that can be exposed to cyber threats, there are a number of different types of issues that can present themselves. Each of these threats is unique in its own right and poses a different type of issue for the user, but typically they all have the same end result… the impacted system is somehow compromised and the user, or the user’s information, is placed at risk. While the list below is extensive, it is not all inclusive. There are far too many types of threats out in the wild of the Internet to list in one article. What I do hope to do is to list those that are most prevalent and give the reader a good overview of what the threat is and how it is often used to do damage to both home and corporate networks. 

Continue reading

Modified PcShare backdoor replaces Windows Narrator to gain full control of systems

Network security

Security researchers have discovered a modified version of the open source backdoor PcShare which seems to originate from a Chinese advanced persistent threat (APT) group.

The malware has been used to target technology firms, and it is deployed via side-loading by a legitimate NVIDIA application. As part of the attack, a Trojanized version of Windows' Narrator screen reading tool is used to gain remote access to systems without the need for credentials.

Continue reading

Sneaky cryptocurrency-mining malware Skidmap hits Linux

Monero mining

Security researchers at TrendMicro have discovered a rootkit-like strain of malware that is striking Linux users. Called Skidmap, the malware is a cryptocurrency miner, but there is much more to it than that.

Skidmap is clever. Very clever. It goes out of its way to disguise itself, going as far as faking system statistics to hide the tell-tale high CPU usage that might give it away. More than this, the Monero-mining malware can also give attackers unlimited access to an infected system.

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

Regional iGaming Content

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.