New ransomware spreads through malicious links in Skype IMs

A new malicious worm that spreads through Instant Messages (IMs) over Skype has been discovered. This worm manifests itself as yet another variation of ransomware and also unloads itself to generate a click fraud from the users’ machine. The worm is a strain of the Dorkbot virus and it utilizes the notorious Blackhole security exploit […]

The evolving nature of malware and security threats

The composition of malware has changed considerably over the last few years. What used to be an independent and solo industry has now transformed into a professional syndicate. As security solution providers, it is our duty to stay abreast of such changes and evolution to alter our strategy. Here are some notable changes that are […]

Will Windows 8 “ELAM” be the David for “Malware” Goliath?

AntiMalware vendors have the uphill task of tackling thousands of malware on a daily basis. One of the top challenges that AntiMalware vendors face is handling early boot malwares. Sophistication of malware has reached such a level that they take control of the system early in the boot process. This is at a stage when […]

The different types of malware seen in the wild

We repeatedly speak about the different techniques that attackers use to infect machines with malware. We also provide precautions that users can take to protect themselves from malware and phishing threats. In this post we will highlight the different strains of malware that are seen in the wild and what dangers they pose. Though most […]

Microsoft disrupts major botnet by blocking malicious domain

Microsoft recently won a court order to host “3322.org”, a nefarious Internet domain based in China, with its own dynamic DNS. The malicious domain hosts around 70,000 malicious subdomains and generates close to 500 different strains of malware that are distributed via counterfeit software. One of the most infamous botnets to originate from this source […]

Oracle releases Java 0-day vulnerability security patch

Yesterday we highlighted the Java 7 0-day vulnerability (CVE-2012-4681) that necessitated immediate attention by disabling the Java plug-in. Oracle has now addressed this vulnerability by releasing a security patch that users should install on an immediate basis. In the past, Oracle has only released updates once every 4 months. Hence it was expected that this […]

How to avoid the latest Java 0-day vulnerability

Java application software has always been extremely vulnerable due to its cross-platform nature. Exploits developed for this software platform can be used to affect various computer systems across diverse computing environments. Now, a new 0-day vulnerability is being exploited by attackers and this is causing mayhem across the computer security world. What is the vulnerability? […]

Gauss Malware – Updated version of Stuxnet

Gauss is a highly complex and sophisticated online banking malware that belongs to the same family as Flame, Duqu and Stuxnet. Gauss seems to be updated version of Stuxnet malware. Similar characteristics of these malwares are as follows: Use encryption method (XOR) Command and control (C&C) servers Use .LNK exploit vulnerability Use USB as storage […]

Android fragmentation leads to security hazards

A new version of Android always brings with it tremendous amount of fanfare and adulation. Some versions gain more popularity than others and penetrate deeper markets. However, ‘fragmentation’ is a major hindrance that Android faces and the latest upgrades seldom reach all markets simultaneously. This creates several security loopholes that can be exploited. A patched […]