Duping the machine – the cunning malware that throws off researchers

Traditionally, when malware detects that it is not running in a genuine victim setting, it will simply exit immediately. But there’s a certain subset of malware families that are more cunning when they detect an analysis environment…

SSCC 157 – Routers, Browsers, Zombies and Sysadmins [PODCAST]

Here it is…this week’s Chet Chat security podcast. In this episode: fixing routers, trusting browsers, killing zombies and showing TLC to sysadmins.

It’s all about trust! 60 Sec Security [VIDEO]

Watch 60 Second Security for 19 July 2014 – it’s all about trust!

Notorious Shylock banking malware taken out by law enforcement

Law enforcement action led by the National Crime Agency (NCA) in the UK has knocked out the infrastructure of a banking malware known as Shylock, because of excerpts from Shakespeare’s Merchant of Venice hidden in its code. Here’s how to check to make sure you weren’t among the more than 30,000 PCs that were infected.