Was the R2D2 Trojan used by German law enforcement agencies to spy on citizens?
Read our FAQ, and learn more about this unfolding case.
A Trojan horse allegedly created by the German government to spy on citizens' online activity and Skype conversations has been discovered.
Sit back, eat your popcorn, and get ready for the political storm if this proves to be true.
After Microsoft's shutdown of the Kelihos botnet on Monday some suggested it would slow down Mac malware purveyors. While the shutdown of the botnet and the cz.cc domain will help, it's only temporary.
Technology blogger Mark Maunder recently wrote about an intrusion to his WordPress site.
The culprit was a widespread image-tweaking utility called timthumb. Learn what happened and how to fix it.
The word Trojan has many meanings, and when it is used without qualification in headlines, it's hard to know which one is meant.
So here's some weekend polymathery for you. Enjoy. (Yes. There is a connection to computer security.)
A new Trojan fake anti-virus is in the wild and targeting both Mac and Windows users. Even worse, it is spreading through poisoned Google image searches. Is your Mac protected?
Don't just read the latest computer security news - watch it in 90 seconds!
This month: parcel-tracking malware goes large, HBGary Federal gets owned, OS X gets a Trojan of sorts, and Windows 7 gets SP1 at last.
The author of the DarkComet malware contacted us to disclaim any association with the BlackHole RAT Trojan we wrote about last week. Find out the specifics of what this means, if anything.
A new remote access Trojan for Mac OS X surfaced in the lab showing malware authors are actively developing for Apple computers. Read on to learn its capabilities and how it works.
In malware analysis, it is quite common to come across attacks that you quite simply cannot believe could really work. I quite often find myself asking the question how anyone could actually fall victim to that? Yesterday, one of my colleagues was analyzing a banking Trojan that provided just such a case.
Stuxnet, the malware story which refuses to die, has dominated recent security media coverage. Firstly, Stuxnet targets the Programmable Logic Controllers (PLCs) used in plants and factories. Secondly, Stuxnet's prevalence was apparently greatest in Iran, giving hyperbolistas plenty to dine out on.
SophosLabs is seeing another widespread malicious spam attack being sent to email addresses around the world. The emails, which have a malware-infected attachment called Contract_05_07_2010.zip, pretend to be a legal contract - however, opening the contents of the file could Read more…
Next to OS X users, Linux users are the most arrogant in their perception that they are immune to malware infections. Unfortunately for them, this morning the administrators of UnrealIRCd.com had to post that their Unix/Linux source code had been Read more…
In 2006, Australia qualified for the World Cup by beating Uruguay in a final decider match at home in Sydney's Olympic Park. (The oddity of Australia qualifying via South America, not Asia, was finally rectified after the 2006 competition.) John Read more…
In the anti-malware business we often quibble over details the general public does not care about. To us these differences are important, though, as classifying a piece of malware helps us define and understand its nature and helps those of Read more…
Four London-based men, found guilty of using a sophisticated Trojan horse to steal money from online bank accounts, have been sentenced to a total of over 13 years in prison by a British court. The malware deployed by Azamat Rahmonov, Read more…