Home Tags Malicious Software

Tag: Malicious Software

Malware, short for malicious software, is any software used to disrupt computer operations, gather sensitive information, gain access to private computer systems, or display unwanted advertising. Malicious software was called computer virus before the term malware was coined in 1990 by Yisrael Radai. The first category of malware propagation concerns parasitic software fragments that attach themselves to some existing executable content. The fragment may be machine code that infects some existing application, utility, or system program, or even the code used to boot a computer system. Malware is defined by its malicious intent, acting against the requirements of the computer user, and does not include software that causes unintentional harm due to some deficiency.

Malware may be stealthy, intended to steal information or spy on computer users for an extended period without their knowledge, as for example Regin, or it may be designed to cause harm, often as sabotage (e.g., Stuxnet), or to extort payment (CryptoLocker). ‘Malware’ is an umbrella term used to refer to a variety of forms of hostile or intrusive software, including computer viruseswormstrojan horsesransomwarespywareadwarescareware, and other malicious programs. It can take the form of executable code, scripts, active content, and other software. Malware is often disguised as, or embedded in, non-malicious files. As of 2011 the majority of active malware threats were worms or trojans rather than viruses.

Rooting Pokémons in Google Play Store

A few days ago we reported to Google the existence of a new malicious app in the Google Play Store.The Trojan presented itself as...

RAA Ransomware Installs Data Stealing Pony Malware

You don't want this pony Image: iStock A form of ransomware which also contains a data stealing Trojan has been updated to become more effective at...

Gugi: from an SMS Trojan to a Mobile-Banking Trojan

In the previous article, we described the mechanisms used by Trojan-Banker.AndroidOS.Gugi.c to bypass a number of new Android 6 security features.In this article, we...

A malicious pairing of cryptor and stealer

We have already seen some cryptor attacks where malicious programs with different functions have been used in combination.For example, one version of the Shade...

Two-Thirds Of Companies Pay Ransomware Demands

Ransomware infections like Cerber are becoming an increasing problem for businesses. Image: Check Point The majority of organisations which become infected by ransomware will give into...

The Missing Piece – Sophisticated OS X Backdoor Discovered

In a nutshell Backdoor.OSX.Mokes.a is the most recently discovered OS X variant of a cross-platform backdoor which is able to operate on all major operating...

Banking Trojan, Gugi, evolves to bypass Android 6 protection

Almost every Android OS update includes new security features designed to make cybercriminals’ life harder.And, of course, the cybercriminals always try to bypass them. We...

Malware Exposes Payment Card Data At Kimpton Hotels

The Sir Francis Drake Hotel in San Francisco is one of the Kimpton Hotels affected by the malware. ...

Malware-Ridden Word Docs Lead To Microsoft Alert Blurt

MICROSOFT HAS taken the trouble to warn Windows users about an attack that takes what trust people have left in the software and throws...

How Trojans manipulate Google Play

For malware writers, Google Play is the promised land of sorts. Once there, a malicious application gains access to a wide audience, gains the...

The Hunt for Lurk

In early June, 2016, the Russian police arrested the alleged members of the criminal group known as Lurk.The police suspected Lurk of stealing nearly...

Wildfire Ransomware Code Cracked – Unlock For Free

Wildfire ransomware has plagued victims in The Netherlands and Belgium Image: McAfee Labs Victims of the Wildfire ransomware can get their encrypted files back without paying...