Are you ready for state-sponsored zombie malware attacks?

CTOvision

In hindsight, the blog post should have been titled “Are you ready for state-sponsored zombie malware attacks?” Zombie malware combines the most deadly aspects of malware and zombie computers into one horrible mess. Typically malware gets […]. Artificial Intelligence CTO Cyber Security Cyber Threats Internet of Things News Robots Cybersecurity Malware

Citadel malware developer jailed

Computer Weekly

A Russian man believed to be one of the developers of the Citadel malware used to steal millions by infecting around 11 million computers around the world

Trending Sources

FBI arrests UK WannaCry hero on malware charges

Computer Weekly

The Briton credited with stopping the WannaCry global malware attacks in their tracks in May has been arrested in the US on malware charges

Leaked SMB exploits make malware powerful, warns Cylance

Computer Weekly

Four key exploits at the heart of hacking tools leaked by the Shadow Brokers have given malware authors a lot of power, say security researchers

SMB 73

Considerations for reasonable malware response

IT Toolbox

In today’s world of endless malware infections, most response efforts are reactive. They always seem to happen to the worst possible people or during the worst possible times – typically to a C-level executive late on a Friday afternoon. As it relates to these type of response efforts, I’m often asked whether you should leave the system running or should you just shut

Security Think Tank: Equip employees to guard against malicious malware

Computer Weekly

What strategies should organisations follow to block malware attachments which continue to account for two-thirds of malware infections that result in data breaches

Financial cyber attacks increase as malware writers join forces

Computer Weekly

Financial malware attacks increased 16% in the second quarter of the year, driven by collaboration between the developers of two banking Trojans in the top the financial malware threats, says Kaspersky Lab

WannaCry hero malware trial postponed

Computer Weekly

The US court appearance of British WannaCry hero on charges of writing and distributing malware has been postponed

Non-malware attacks pose bigger threat than malicious software

Computer Weekly

Malware-free cyber attacks are on the rise and artificial intelligence in cyber security is still far from replacing humans, according to most cyber security researchers

Fileless Malware: You should already be prepared

IT Toolbox

The buzzword "fileless malware" is increasingly causing fear, uncertainty, and doubt. But we should already have controls in place

Security Think Tank: Malware infection is inevitable, so be prepared

Computer Weekly

How can businesses best prepare their cyber defences in light of the fact that attackers are increasingly using malware designed to evade detection and analysis

Security Think Tank: 10 control areas to mitigate against malware attacks

Computer Weekly

What strategies should organisations follow to block malware attachments which continue to account for two-thirds of malware infections that result in data breaches

Strider cyber attack group deploying malware for espionage

Computer Weekly

Symantec security researchers have uncovered a spying campaign by a previously unknown group using modular malware as stealthware

How to Remove Malware Tips

Galido

Malware is an abbreviated term that stands for “malicious software.” What is Malware? There are various types of malware. Malware creation has become popular in recent times due to the the lure of money that can be made through organized Internet crime.

Malware hidden in CCleaner targeted tech firms

Computer Weekly

Major tech firms were targeted by malware hidden in Avast’s Piriform CCleaner software, researchers have found, leading to speculation that it may have been state-sponsored espionage attack

New Video: Automating Your Cyber Defenses Including Malware Removal

CTOvision

The video at this link and embedded below provides an overview of conclusions from CTOvision research into ways to automate the removal of cyber threats (including malware) from your enterprise. By Bob Gourley.

Tips on How to Protect your Internet of Things Devices against Malware

IT Toolbox

Here, we are going to discuss how to protect our Internet of Things devices against malware, as a large number of them is already infected, generally speaking

Five Keys for Avoiding Malware

IT Toolbox

These are dangerous times for corporate IT. From employees carrying corporate data on their insecure personal devices and the threat of exploited IoT to company servers routinely being probed for vulnerabilities and rampant ransomware, there are many reasons why corporate IT professionals should stay up at night worrying. Last year ransomware attacks grew by more than a hundredfold

Financial malware more than twice as prevalent as ransomware

Computer Weekly

While ransomware continues to make the headlines, particularly in the wake of WannaCry, research has revealed that financial threats are 2.5 times more prevalent

PoS malware attacks highlights need for security standards in hotel industry

Computer Weekly

Ongoing data breaches through point of sale malware highlights the need for security standards and central support for franchisees in the hotel industry, say security experts

Nearly a third of malware attacks are zero-day exploits

Computer Weekly

Companies could be missing up to third of malware that is targeting them, according to a report by WatchGuard

Hospitals targeted using camouflaged old malware

Computer Weekly

Specialised devices running older versions of operating systems are becoming critical points of cyber attack vulnerability, warns TrapX Security

Security Think Tank: Awareness and incident response key to fighting evasive malware

Computer Weekly

How can businesses best prepare their cyber defences in light of the fact that attackers are increasingly using malware designed to evade detection and analysis

Malware distributors are switching to less suspicious file types

Network World

After aggressively using JavaScript email attachments to distribute malware for the past year, attackers are now switching to less suspicious file types to trick users. Last week, researchers from the Microsoft Malware Protection Center warned about a new wave of spam emails that carried malicious.LNK files inside ZIP archives. It has been abused to download malware in the past and there are even malware programs written entirely in PowerShell.

Mac malware continuing to escalate, warn security researchers

Computer Weekly

Malware targeting the Mac operating system has seen a significant growth in the first half of this hear, according to security firm Malwarebytes

Fileless malware: An undetectable threat

Tech Republic Security

Fileless malware is a dangerous and devious threat--and it's gaining traction. Find out how it might affect your organization, network, and the devices connected to it

Malware Museum’s 10 greatest hits

Network World

Big hits Since the malware museum opened its virtual doors in February, its collection of de-fanged DOS-based malware from the 80s and 90s has attracted nearly 1 million views.

Encryption hiding malware in half of cyber attacks

Computer Weekly

Cyber attackers are using encryption to hide malicious activity, making it increasingly difficult to find as more organisations turn to encryption to protect data, a study has revealed

Study 91

Ransomware Evolves: Entire Hospital Including Emergency Rooms Disrupted

CTOvision

But still the malware gets in. The malware gets in. You can block and patch and try your hardest to prevent, but the bad guys will innovate and eventually malware gets in. Which leads to this advice: Work hard to prevent ransomware and other malware attacks by using best practices, and have your approach validated by an external assessment (see Cognitio ). But understand that this is an evolving threat, and eventually malware will get in. Bob Gourley.

Security Think Tank: Addressing the malware arms race

Computer Weekly

How can businesses best prepare their cyber defences in light of the fact that attackers are increasingly using malware designed to evade detection and analysis

Non-malware attacks are on the rise

Network World

Security pros need to pay attention to malicious activities that don’t rely on actual malware to succeed, according to a study by Carbon Black. Attacks that exploited applications and processes legitimately running on systems – non-malware incidents – have risen from representing about 3% of all attacks in January to about 13% in November, the company’s “Non-malware attacks and ransomware take center stage in 2016” report says.

Study 23

Security Think Tank: Minimise malware risks through education, process and technology

Computer Weekly

What strategies should organisations follow to block malware attachments which continue to account for two-thirds of malware infections that result in data breaches

Hunting Down and Killing Ransomware

IT Pros Rock!

Scareware, a type of malware that mimics antimalware software, has been around for a decade and shows no sign of going away. The goal of scareware is to fool a user into thinking that their computer is heavily infected with malware and the most convenient.( malware read more ).