spyware - News, Features, and Slideshows
Keylogging malware that may have been used by the NSA shares signficant portions of code with a component of Regin, a sophisticated platform that has been used to spy on businesses, government institutions and private individuals for years.
By Lucian Constantin | 27 January, 2015 22:44
In addition to having its own arsenal of digital weapons, the U.S. National Security Agency reportedly hijacks and repurposes third-party malware.
By Lucian Constantin | 20 January, 2015 02:50
A sophisticated group of cybercriminals has stolen over US$25 million by hacking into the infrastructure of numerous financial institutions in Russia and former Soviet Union countries, as well as into point-of-sale systems belonging to U.S. and European retailers.
By Lucian Constantin | 23 December, 2014 03:43
A new computer Trojan based on the infamous ZeuS banking malware is targeting users of over 150 banks and payment systems from around the world, security researchers warn.
By Lucian Constantin | 20 December, 2014 05:13
A newly discovered malware program designed to infect Linux systems is tied to a sophisticated cyberespionage operation of Russian origin dubbed Epic Turla, security researchers found.
By Lucian Constantin | 10 December, 2014 02:38
Whitepapers about spyware
In 2010, the threat posed by the web is sharper and more extensive than ever before. Almost any website can now host malware, or forward you to one that does. Indeed, an infection is much more likely to result from a visit to a perfectly legitimate website that has been compromised with a virus or spyware – than from one set up specifically to spread malware. Read More.
This edition of the recurring Threat Landscape Review examines data from WildFire™, a key component of the Palo Alto Networks threat intelligence cloud, to identify how organizations in different industries are targeted and affected by malware. Download the latest research from Unit 42 to see current trends and malware distribution patterns across 10 industries, and find out what you need to know about the Kuluoz malware family, and how to defend against it.
- Ghost Linux vulnerability can be exploited through WordPress, other PHP apps
- BT to test 500Mbps broadband over copper in two towns
- The Upload: Your tech news briefing for Friday, January 30
- Military-funded robots can learn by watching YouTube
- Turn your whistling into song with the tap of an app
- PayPal’s BattleHack comes to Australia for a second time
- VPN providers play 'cat-and-mouse' with China's growing censorship
- Data retention inquiry kept in the dark on costs
- A look at real-time brain-to-exoskeleton information transmission
- Facebook tests delivering tips about your location
- How three small credit card transactions could reveal your identity
- Data retention to involve 'petabytes of data' for Vodafone
- Citrix's 900 job cuts seen as 'defensive' move
- Amazon returns to profit as holiday sales soar