Category: Malware
Security researcher Patrick Wardle of Synack has discovered a new potential use of malware that targets the use of the Mac OS X webcam. This new attack allows OS …
The malicious program first appeared in May 2016, detected by Doctor Web after being added to its virus database under the name Linux.DDoS.87 and Linux.DDoS.89. The Trojan can work …
APT28 is a Russian hacking group that is recently known for the DNC hacking and the World Anti-Doping Agency (WADA) Olympic data leaks. APT28 is a group of hackers …
Researchers at InfoArmor have uncovered a new tool that allows cybercriminals to package malware into popular torrent files. This new tool is called RAUM and is believed to have …
Security researchers at zScaler have come across a new variant of a commercial keylogger called iSpy. This new variance not only captures victim’s keystrokes, but it can also take …
Malware researchers from security firm Sophos have analyzed a new strain of malware detected as Mal/Miner-C that was designed to abuse resources of the infected machine to mine Monero …
The IT security researchers at MalwareMustDie have discovered a malware that is capable of infecting Linux-based Internet of Things (IoT) devices and web servers to launch DDoS attacks, called …
There have been some trojans that install malicious versions of the TeamViewer software circulating since 2011. Dr. Web has posted a new iteration of this tojan, calling it BackDoor.TeamViewerENT.1. …
Level 3 Threat Research Labs tracked a family of malware, variously called Lizkebab, BASHLITE, Torlus and Gafgyt, that is capable of causing IoT-based DDoS attacks. Most of the infected …
Apple’s iPhone iOS has been considered to be one of the most secure mobile operating systems around. If you performed a jailbreak to unlock your iPhone, then you opened …