Malware

Government agencies have discovered a deadlier new home and office network device killer malware that replaces weaker VPNFilter code. U.S. and U.K. governments published a joint report Wednesday detailing a new malware strain developed by Russia's military cyber unit deployed in the wild since 2019....

Despite the best efforts by law enforcement, data leaks related to ransomware climbed 82 percent in 2021 over the previous year, according to the 2022 CrowdStrike Global Threat report. Feeding the increase in data snatching was an increase in "Big Game Hunting" -- broad, high-visibility attacks that...

Brace yourself, 2022 promises to bring expanded cyber confrontations as ransomware attacks gain the high ground. A dangerous increase in ransomware attacks last year caused devastating compromises to government organizations, critical infrastructure, and businesses. Much of the increase resulted fro...

This nasty software bug has much of the IT world in a panic as it follows us into the New Year. No doubt, many organizations and SMBs with no IT staff are clueless about its existence. But ignorance of Log4j only makes them more susceptible to an attack. They remain defenseless.

Bitdefender security researchers have uncovered a Romanian-based threat group active since at least last year targeting Linux-based machines with weak Secure Shell Protocol (SSH) credentials. The researchers discovered the group was deploying Monero mining malware used to steal cryptocurrency.

Early adopters seeking a premature peek of Windows 11 via unauthorized channels may be in for a nasty surprise -- a dose of malware. Kaspersky Lab reports that an unofficial installer is in the wild that promises to install the next version of Microsoft's ubiquitous operating system on a user's comp...

Thousands of hacker attacks were launched on a network of smart home devices designed by researchers to assess the risk the gadgets pose to consumers. During the initial week the "honeypot" network was online, 1,017 unique scans or hacking attempts were directed at the devices on the net, which incl...

Cybercriminals are deliberately targeting phones, tablets, and Chromebooks to increase their odds of finding a vulnerable entry point. The Financial Services Threat Report from Lookout disclosed that 20 percent of mobile banking customers had a trojanized app on their devices when trying to sign int...

The notorious Emotet botnet software began uninstalling itself from some one million computers Sunday. The uninstall command was part of an update sent to the infected computers by law enforcement servers in the Netherlands after Emotet's infrastructure was compromised in January during a multinatio...

Businesses fearful their workers may be targeted by fraudsters will want to take a look at the free Tax Scam Awareness Kit offered by Proofpoint. The kit, for both Windows and macOS, includes materials for an employee education campaign about tax fraud, three educational videos, an infographic, answ...

Malicious online actors used email as their prime vehicle for delivering malware to their victims in the last quarter of 2020. The HP-Bromium Threat Insights Report found that 88 percent of malware was delivered by email into its targets' inboxes, many times evading measures at email gateways to fi...

Catastrophic events, like a pandemic, coupled with hasty technological change such as many people forced to work from home immediately, have been a rich environment in the past for phishers, who use deception to infect machines with malware, steal credentials, and invade corporate networks. However...

Nearly 30,000 Macs have been infected with a new malware strain. Discovered by researchers at Red Canary, the malware has been sitting on it hosts waiting for a payload that never arrived. In a statement provided to TechNewsWorld, Apple said that upon discovering the malware, it revoked the certific...

An outlaw online network that's been used to infect millions of computers with ransomware has been disrupted by Microsoft. The company announced Monday that, together with telecommunications providers around the world, it was able to cut off the infrastructure used by the Trickbot botnet so it could...

Technewsworld Channels