# Tags

Beware of Fake Complaint Emails from BBB

Another email scam that uses the name and logo of the Better Business Bureau (BBB) has continued to spread over the Internet. A majority of such emails carry the recognisable BBB torch logo and contain the subject line “Case #91492169”. These emails carry an attachment that contains a malicious executable file with the name “BBB_complaint.pdf.exe“. This […]

Google Play Store may soon get a built-in malware scanner

Google intends to release a future update to its Google Play Store that will provide client-side protection from malware present in malicious applications. This malware scanner will analyze an application when a user attempts to install it on an Android device. If there is a known strain of malware present in the application, the user […]

New ransomware spreads through malicious links in Skype IMs

A new malicious worm that spreads through Instant Messages (IMs) over Skype has been discovered. This worm manifests itself as yet another variation of ransomware and also unloads itself to generate a click fraud from the users’ machine. The worm is a strain of the Dorkbot virus and it utilizes the notorious Blackhole security exploit […]

The evolving nature of malware and security threats

The composition of malware has changed considerably over the last few years. What used to be an independent and solo industry has now transformed into a professional syndicate. As security solution providers, it is our duty to stay abreast of such changes and evolution to alter our strategy. Here are some notable changes that are […]

Will Windows 8 “ELAM” be the David for “Malware” Goliath?

AntiMalware vendors have the uphill task of tackling thousands of malware on a daily basis. One of the top challenges that AntiMalware vendors face is handling early boot malwares. Sophistication of malware has reached such a level that they take control of the system early in the boot process. This is at a stage when […]

The different types of malware seen in the wild

We repeatedly speak about the different techniques that attackers use to infect machines with malware. We also provide precautions that users can take to protect themselves from malware and phishing threats. In this post we will highlight the different strains of malware that are seen in the wild and what dangers they pose. Though most […]

Microsoft disrupts major botnet by blocking malicious domain

Microsoft recently won a court order to host “3322.org”, a nefarious Internet domain based in China, with its own dynamic DNS. The malicious domain hosts around 70,000 malicious subdomains and generates close to 500 different strains of malware that are distributed via counterfeit software. One of the most infamous botnets to originate from this source […]

Oracle releases Java 0-day vulnerability security patch

Yesterday we highlighted the Java 7 0-day vulnerability (CVE-2012-4681) that necessitated immediate attention by disabling the Java plug-in. Oracle has now addressed this vulnerability by releasing a security patch that users should install on an immediate basis. In the past, Oracle has only released updates once every 4 months. Hence it was expected that this […]

How to avoid the latest Java 0-day vulnerability

Java application software has always been extremely vulnerable due to its cross-platform nature. Exploits developed for this software platform can be used to affect various computer systems across diverse computing environments. Now, a new 0-day vulnerability is being exploited by attackers and this is causing mayhem across the computer security world. What is the vulnerability? […]