New ransomware spreads through malicious links in Skype IMs

A new malicious worm that spreads through Instant Messages (IMs) over Skype has been discovered. This worm manifests…

How to remove the FBI Moneypak virus from an infected machine

Last month we had highlighted the growing threat of a fake FBI notice in the United States which…

The evolving nature of malware and security threats

The composition of malware has changed considerably over the last few years. What used to be an independent…

Will Windows 8 “ELAM” be the David for “Malware” Goliath?

AntiMalware vendors have the uphill task of tackling thousands of malware on a daily basis. One of the…

The different types of malware seen in the wild

We repeatedly speak about the different techniques that attackers use to infect machines with malware. We also provide…

Microsoft disrupts major botnet by blocking malicious domain

Microsoft recently won a court order to host “3322.org”, a nefarious Internet domain based in China, with its…

Oracle releases Java 0-day vulnerability security patch

Yesterday we highlighted the Java 7 0-day vulnerability (CVE-2012-4681) that necessitated immediate attention by disabling the Java plug-in….

How to avoid the latest Java 0-day vulnerability

Java application software has always been extremely vulnerable due to its cross-platform nature. Exploits developed for this software…

Gauss Malware – Updated version of Stuxnet

Gauss is a highly complex and sophisticated online banking malware that belongs to the same family as Flame,…

Android fragmentation leads to security hazards

A new version of Android always brings with it tremendous amount of fanfare and adulation. Some versions gain…