Latest Viruses & Latest Malware Trends
Get cutting-edge security as it happens. Read our experts’ tips and techniques to help you avoid and defeat the latest malware trends, and view portions of their actual research to stay even more informed.

This post was written with Diwakar Dinkar. McAfee Labs recently came across the new ransomware variant HydraCrypt. Like some previous ransomware variants, HydraCrypt is distributed using the Angler exploit kit. HydraCrypt encrypts a victim’s files and appends the filenames with the extension “hydracrypt_ID_<8 random characters>.” The malware also drops one plain-text file on the victim’s machine […]

Coauthored by Raj Samani, Chief Technology Officer of Intel Security’s Europe, Middle East, and Africa division Recent reports of electricity outages across the Ukraine has led to significant speculation regarding the specific malware that was used to disrupt supplies. Intel Security’s approach in understanding this event included making contact with the impacted organization to offer […]

The cybersecurity sector is continually evolving, with new changes affecting the way information is traded and protected. Now that 2016 is in full swing, it’s time to start looking forward to which threats lie ahead. In our January #SecChat, we turned our focus to top security predictions for the New Year. Participating in this chat […]

This post was written by Oliver Devane and Mohinder Gill of Intel Security. We recently received a sample from a customer and upon initial analysis it looked like a bundled software installer. Upon execution, the installer launches a website and then attempts to download an executable—an installer for FLV Player. Nothing out of the ordinary, […]

One constant in cybersecurity is the continual rise of sophistication and creativity of attackers. In 2016, we will see a fundamental expansion of their techniques, including the rise of integrity attacks. The industry has become accustomed to traditional availability and confidentiality attacks, which are typically crude but often effective. Denial of service attacks, for example, undermine […]