Archives - Malware Attacks


Be careful opening .zip file attachments

Email attachments are to some degree unavoidable in normal personal and business communications. Nevertheless, it’s a good idea to minimize your exposure. Don’t open any attachments from people not in your contacts list and ask senders if they can share the document via a cloud link instead, which tends to be much safer.

Cybersecurity Safety Tips for Your New Tech Toys

The winter holiday season is a bonanza for the tech industry. Every firm from Apple to Nintendo sees its earnings skyrocket during the months of November and December, when millions of smartphones, tablets, game consoles, PCs and more fly off the shelves. A Consumer Technology Association survey found that more than two-thirds of American adults planned […]

What is end-of-life software?

Sometimes vendors will discontinue support for a software program or issue software updates for it (also known as end-of-life [EOL] software). Continued use of EOL software poses consequential risk to your system that can allow an attacker to exploit security vulnerabilities present that could result in malware attacks. The use of unsupported software can also […]

ZBot: The never ending Trojan

It was around 2007 when we first encountered the ‘Win32/ZeusBot Trojan Horse’, AKA ‘ZBot’. The first versions of the malware was used against the U.S. Department of Transportation, mainly in order to steal information such as various passwords. Since then, multiple variants have been released, adding more and more functionalities and ‘bad’ stuff with every […]

Hackers vs. Researchers: Evasion methods

Innovations that appeared in cyber-crimes over the past years, proving that the ‘trickle-down’ effect, known in marketing and economics, is not just about access to products like tablet devices and space tourism. Just like in the real world, evasion techniques, once the exclusive property of the elite programmers, is flowing at an ever increasing rate […]