Tag Archive for: Malware

Rombertik is a Bizarre, Scary Brilliant Piece of Self-Destructing Malware – DailyTech


DailyTech

Rombertik is a Bizarre, Scary Brilliant Piece of Self-Destructing Malware
DailyTech
Not even the legendary Flame and Stuxnet viruses that the U.S. government unofficially used to target Iranian nuclear and oil facilities featured such wild and crafty code to avoid detection. The malware will literally destroy your system to try to

and more »

flame malware – read more

India is the No 1 host country of Botnet-related malware in Asia in H2, 2014 – DATAQUEST


DATAQUEST

India is the No 1 host country of Botnet-related malware in Asia in H2, 2014
DATAQUEST
SmsSend generates profits for criminals by infecting Android devices with a Trojan that sends SMS messages to premium-rate numbers. Ransomware also continued to plague mobile users, with the Koler and Slocker families of ransomware identified as the …
India tops as hub for malware hostingTimes of India

all 4 news articles »

android botnet – read more

Can Macs get viruses and malware? We ask an expert

How would someone know if their Mac was infected? “They wouldn’t, because most of the malware is very, very stealthy these days,” says Bogdan, “It’s the same with PCs, hackers realized that the more silent they are, the longer they can get away …
mac hacker – read more

Rombertik malware destroys computers if detected

A new type of malware resorts to crippling a computer if it is detected during security checks, a particularly catastrophic blow to its victims.

The malware, nicknamed Rombertik by Cisco Systems, is designed to intercept any plain text entered into a browser window. It is being spread through spam and phishing messages, according to Cisco’s Talos Group blog on Monday.

Rombertik goes through several checks once it is up and running on a Windows computer to see if it has been detected.

That behavior is not unusual for some types of malware, but Rombertik “is unique in that it actively attempts to destroy the computer if it detects certain attributes associated with malware analysis,” wrote Ben Baker and Alex Chiu of the Talos Group.

To read this article in full or to leave a comment, please click here

Network World Security