Malware
Malware is more prevalent, sophisticated and targeted than ever. In recent history, we have witnessed the devastation wrought by Stuxnet, the most dangerous malware ever seen, and the infection of thousands of Apple Macs which some say is a sign that malware writers have turned their attention to the popular platform. Here we keep track of malware trends and attacks.
Blackshades RAT coder handed stiff prison sentence  
By Juha Saarinen | Jun 25, 2015 | Comment Now 
Spyware co-creator given 57 months by US court.
 
Duqu spyware used stolen Foxconn certs  
By Eric Auchard, Joseph Menn | Jun 16, 2015 | Comment Now 
Attackers target hardware manufacturers to steal digital credentials.
 
Kaspersky servers infected by 'Duqu 2.0' malware 
By Tom Reeve | Jun 11, 2015 | Comment Now 
Hackers had access for 'several months' prior to detection.
 
Ransomware author recants, posts decryption keys 
 
Security vendor Tencent found cheating in tests 
By Juha Saarinen | May 8, 2015 | Comment Now 
Joins Qihoo 360 to be stripped of awards.
 
New malware strain destroys master boot record to avoid detection 
 
Chinese security vendor caught cheating in AV test 
By Juha Saarinen | May 1, 2015 | Comment Now 
Qihoo 360 loses certifications.
 
Aussie enterprises targeted in Bartalex spam campaign 
By Juha Saarinen | Apr 29, 2015 | Comment Now 
Office macro downloads malware used in JP Morgan heist.
 
Point-of-sale malware evolves to target travellers 
By Danielle Walker | Apr 7, 2015 | Comment Now 
NewPosThings grows its capabilities.
 
US State Dept shuts down internet systems 
By Juha Saarinen | Mar 16, 2015 | Comment Now 
Plans to harden infrastructure to protect data.
 
Lenovo stops pre-loading 'bloatware' on PCs 
By Juha Saarinen | Mar 1, 2015 | Comment Now 
Offers free anti-virus subscription.
 
Extortionists upgrade Reveton ransomware 
By Juha Saarinen | Feb 6, 2015 | Comment Now 
New payment method introduced.
 
The NSA's infosec tips won't stop you from being hacked 
By Tony Campbell | Jan 27, 2015 | Comment Now 
[Blog post] Focus on being more secure than your neighbours.
 
Zero-day Adobe Flash Player flaw discovered 
By Juha Saarinen | Jan 22, 2015 | Comment Now 
Spotted in popular exploit kit used by attackers.
 
Canada bans automatic software installations  
By Juha Saarinen | Jan 16, 2015 | Comment Now 
Kosher code caught by anti-malware law.
 
Gogo inflight wi-fi uses man-in-the-middle malware tactics 
Jan 7, 2015 | Comment Now 
Spoofs web security to keep flyers off You Tube.
 
Sony hack: it's big, bad, and we need to know what happened  
By Juha Saarinen | Dec 10, 2014 | Comment Now 
[Blog post] Breach illustrates the need for mandatory disclosure.
 
North Korean diplomat denies Pyongyang role in Sony hack 
 
FBI warns of 'destructive' malware attack on US companies 
Dec 2, 2014 | Comment Now 
'Watershed event' follows Sony breach.
 
ACMA creates self-service portal for malware diagnosis 
By Brett Winterford | Nov 28, 2014 | Comment Now 
Botnet cleaning made somewhat simpler for ISPs, network operators.
 
US-CERT issues alert for Regin state-sponsored malware 
 
The failure of the antivirus industry 
By Juha Saarinen | Nov 26, 2014 | Comment Now 
[Blog post] Insights from AVAR 2014.
 
Google releases enterprise anti-malware tool for Macs 
By Allie Coyne | Nov 25, 2014 | Comment Now 
"Santa" software arrives in time for Christmas.
 
Regin state-sponsored malware traced to UK, US spies: report 
By Juha Saarinen | Nov 25, 2014 | Comment Now 
Used in surveillance on EU, Belgian telco.
 
Third-party app data at risk from iOS 'Masque' flaw 
By Allie Coyne | Nov 24, 2014 | Comment Now 
App developers encouraged to encrypt data on devices.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Should law enforcement be able to buy and use exploits?



   |   View results
Yes
  13%
 
No
  50%
 
Only in special circumstances
  18%
 
Yes, but with more transparency
  19%
TOTAL VOTES: 729

Vote