Category: blog

  • Spammers use unicode trick to manipulate file names

    Windows executable appears to be Word document. An unicode trick that reverses the order of some characters has been used by spammers to disguise malicious attachments as harmless file types. Unicode enables the representation on computer screens of a very large and still growing number of alphabets, together with many special characters. Among this latter…

  • Canada new hotbed for cybercriminal activity

    Country’s IP addresses less likely to be scrutinized. Security firm Websense has reported a significant increase in cybercrime originating in Canada. Hitherto, Canada and malicious online activity were mainly linked through vast amounts of ‘Canadian pharmacy’ spam sent out to inboxes all over the world. However, malicious activity in the country – including the hosting…

  • Zeus source code leaked

    Banking trojan among the most advanced of its kind. Researchers at Danish security firm CSIS have discovered that the full source code of the Zeus crime kit has been leaked to underground forums. Zeus, also known as Zbot, is one of the most advanced kits of its kind. The Zeus trojan is commonly used to…

  • Smile, you’re on a botnet!

    Multi-platform Java botnet allows for remote control of webcam and microphone. Researchers have discovered a multi-platform botnet running on the Java Runtime Environment (JRE) that can potentially run on both Windows machines and on Mac s. The botnet, of which only the Windows version has been seen in the wild, installs itself on a victim’s…

  • VB announces Virus Bulletin for Kindle

    VB joins the e-book generation. With millions of people now using e-book readers as a convenient way to read while on the go – or simply to cut down on bookshelf space – VB is offering Virus Bulletin subscribers the chance to download the magazine in .prc format. Issues of Virus Bulletin published within the…

  • Scammers take advantage of Epsilon data breach

    Trojan hidden as security tool for affected customers. Scammers are currently taking advantage of the data breach that affected email security provider Epsilon recently, by creating a copy of Epsilon ‘s website and claiming that people can download a ‘security tool’ that tells them whether they have been affected. While far from the first time…

  • Department of Justice shuts down Coreflood botnet

    ‘Stop’ command sent from replaced command and control servers. Earlier this week the US Department of Justice (DoJ) obtained an unprecedented temporary restraining order (TRO) that effectively allowed it to send ‘stop’ commands from the command and control servers of the Coreflood botnet – thus managing to shut it down. As is the case with…

  • First AV-Test certifications of 2011 published

    22 products scored on multiple scales in quarterly test report. Testing organization AV-Test has published its latest round of anti-malware certification tests, with 22 products rated on a wide range of factors. 17 of the 22 products were judged worthy of AV-Test ‘s ‘Certified’ badge, with five not reaching the required standard in a suite…

  • Adobe releases emergency update for Flash Player

    Zero-day exploit actively being abused. Adobe has announced it will release an update for its Flash Player on Friday 15 April, fixing a vulnerability that is currently being exploited. The vulnerability, which affects Flash Player 10.2.x on Windows , Macintosh , Linux and Solaris , can be used by attackers to take control of an…

  • Ransom trojan demands Windows re-activation

    Criminals make money through calls to supposedly free phone number. A new piece of ransomware has been discovered that shows the PC user a blue screen and asks them to re-activate Windows by calling a supposedly free phone number. As it turns out, the number is far from free and is a way for the…