Message:Coronavirus (COVID-19)

Blog

Posts Tagged ‘malware’

It’s not a question of if you will be attacked, but when!

November 14th, 2016 by Mark Daly in ilicomm News No Comments »
Share Button

Penetration testing or ‘pen testing’ is the most effective way of demonstrating that exploitable vulnerabilities within your company’s internet-facing resources have been identified, allowing suitable patches to be applied. The aim is to identify browser exploits, unpatched software, unsecure coding practices and weak encryption algorithms. A penetration test must be conducted by a certified ethical […]

UK cyber cops arrest 14 for £11m malware money laundering

November 4th, 2016 by Mark Daly in Industry News No Comments »
Share Button

UK CYBER COPS at the National Crime Agency (NCA) has arrested 14 people for their suspected involvement in laundering as much as £11m generated by major malware scams. Read more: http://www.theinquirer.net/inquirer/news/2476426/uk-cyber-cops-arrest-14-for-gbp11m-malware-money-laundering

Blue screen of death? It could be malware

November 3rd, 2016 by Mark Daly in Industry News No Comments »
Share Button

Microsoft has issued a severe threat warning about a new virus posing as a Windows Security Essentials installer. The malware displays a bogus blue screen of death with a ‘technical support’ phone number. Read more: http://www.techradar.com/news/blue-screen-of-death-it-could-be-malware

How to Remove Viruses and Malware on Your Windows PC

November 2nd, 2016 by Mark Daly in Industry News No Comments »
Share Button

Whether you saw a message saying a virus was detected, or your computer just seems slow and unreliable, you’ll want to scan for malware on your PC and remove any you find. Read more: http://www.howtogeek.com/126911/what-to-do-if-you-get-a-virus-on-your-computer/

Hackers release new malware into the wild for Mirai botnet successor

November 1st, 2016 by Mark Daly in Industry News No Comments »
Share Button

A group of cyberattackers has created a new strain of malware dedicated to transforming vulnerable IoT devices into slave components for DDoS attacks. Read more: http://www.zdnet.com/article/hackers-release-new-malware-into-the-wild-for-mirai-botnet-successor/

Microsoft Warns about Malware dressed up as Security Essentials

October 31st, 2016 by Mark Daly in Industry News No Comments »
Share Button

Security is the growing and huge concern in the increasingly connected world where we live. The computers are plagued by malware for years, in spite of having several tools available which work to thwart it. Read more: http://www.spamfighter.com/News-20559-Microsoft-Warns-about-Malware-dressed-up-as-Security-Essentials.htm

28 years later: the malware landscape in 2016

October 27th, 2016 by Mark Daly in Industry News No Comments »
Share Button

Back in November 1988, the Morris worm started the first widely recognised and reported malware-based cyberattack, infecting around 5% of all the computers connected to the emerging Internet. Read more: http://www.information-age.com/28-years-later-malware-landscape-2016-123462883/

The most common malware, country by country

October 25th, 2016 by Mark Daly in Industry News No Comments »
Share Button

Microsoft has released an analysis of the extent of malware worldwide and what specific threats are likely to hit each country. Read more: http://www.zdnet.com/article/the-most-common-cyberattacks-country-by-country/

#Mobilemalware campaign wants to keep cyber criminals out of your mobile device

October 24th, 2016 by Mark Daly in Industry News No Comments »
Share Button

Mobile devices such as smartphones or tablets have become ingrained in our daily lives. Technology which was once only found on desktop computers can now be carried in the palm of one’s hands. Yet as the popularity of these devices explodes, the appetite of cybercriminals targeting these devices has grown too. The risk of mobile […]

Ransomware Reaches the Malware Top 3 for the First Time

October 24th, 2016 by Mark Daly in Industry News No Comments »
Share Button

While everybody knows how dangerous and devastating a ransomware infection can be, the number of affected victims was regularly low, and never large enough to warrant a spot on the top 10, let alone top 3 most dangerous malware families around. Read more: http://news.softpedia.com/news/ransomware-reaches-the-malware-top-3-for-the-first-time-509552.shtml#ixzz4NzvcgEXN

Malware lurks in many corners of ‘the cloud’

October 21st, 2016 by Mark Daly in Industry News No Comments »
Share Button

Malicious software is hiding in the cloud, and it may be very difficult to identify, new research finds. A study of 20 major cloud hosting services found as many as 10 percent of the repositories hosted by them had been compromised—with several hundred of the “buckets” actively providing malware. Read more: http://www.futurity.org/malware-cloud-hosting-1276682-2/

This ransomware is now one of the three most common malware threats

October 21st, 2016 by Mark Daly in Industry News No Comments »
Share Button

The threat of ransomware attacks continues to grow. One particular strain of the cryptographic file-locking malicious software has now risen to become one of the top three most prevalent forms of malware used by hackers and cybercriminals. Read more: http://www.zdnet.com/article/this-ransomware-is-now-one-of-the-three-most-common-malware-threats/

More than half of Androids susceptible to ancient malware

October 18th, 2016 by Mark Daly in Industry News No Comments »
Share Button

One of the world’s most prolific Android malware instances is still the most prevalent piece of malware more than two years after it first emerged. The capable trojan known as Ghost Push infects Android up to version five, aka Lollipop, still employed by about 57 per cent of all users. Read more: http://www.theregister.co.uk/2016/10/17/ghost_push_android_malware/

Malware can now detect virtual machines, and then go dark like a Cold War spy

September 29th, 2016 by Mark Daly in Industry News No Comments »
Share Button

One of the more effective ways to counter a malware infection is to make sure that it infects something that can’t have much of an influence on the rest of the system, like a sandboxed virtual machine. However as malware continues to evolve, its creators are now discovering ways to detect whether it is simply […]

Malware figures out if it’s running on VMs and refuses to execute

September 23rd, 2016 by Mark Daly in Industry News No Comments »
Share Button

Malware writers are looking for the absence of documents to figure out which PCs are potential victims and which are virtual machines being used by white hats. SentinelOne senior researcher Caleb Fenton found the novel technique while attempting to coax the malware into activating so it could be analysed. The worm he was working on […]

Police warn of malware-laden USB sticks dropped in letterboxes

September 21st, 2016 by Mark Daly in Industry News No Comments »
Share Button

Police in the Australian State of Victoria have warned citizens not to trust un-marked USB sticks that appear in their letterboxes. The warning, issued today, says “The USB drives are believed to be extremely harmful and members of the public are urged to avoid plugging them into their computers or other devices.” “Upon inserting the […]

New Overseer malware that steals personal details spotted in Google Play

September 20th, 2016 by Mark Daly in Industry News No Comments »
Share Button

Google has removed four apps from its Play Store after they were discovered to be carrying a new form of malware dubbed Overseer. Discovered by security firm Lookout Inc., Overseer was found packaged with four apps and once installed could steal a user’s name, phone number, email address and contact history, along with a host […]

Double-dipping malware steals iOS creds and roots Android

September 19th, 2016 by Mark Daly in Industry News No Comments »
Share Button

A newly-outed trojan is exploiting iOS and Android devices, ripping iCloud credentials abusing the trusted link between phones and PCs, says Palo Alto security researcher Claud Xiao. The attack appears to have failed in most circumstances, thanks to iOS’ sandboxing security controls, hardened modern Android operating systems, and the overt nature of the attack, and […]

RAA ransomware now targets businesses, installs data stealing ‘Pony’ malware

September 13th, 2016 by Mark Daly in Industry News No Comments »
Share Button

A form of ransomware which also contains a data stealing Trojan has been updated to become more effective at attacking business targets with new techniques including the ability to install malware and encrypt machines even if they’re offline. The RAA ransomware first appeared in June this year but ransomware is a rapidly evolving operation – […]

Latest strain of Mac malware is a particularly nasty critter

September 12th, 2016 by Mark Daly in Industry News No Comments »
Share Button

A new piece of OS X malware has been uncovered, and it’s a nasty strain of malicious software which has been adapted to target Mac users. The so-called Mokes malware was discovered at the beginning of this year and has already hit Windows and Linux users, and is now a worry for those with an […]

NEED MORE INFORMATION?Contact us to see how we can help your business

Call our Sales Team on:

+44 (0)121 289 3434

or email us at:

hello@ilicomm.com