Tag Archives: Malware

Wolters Kluwer Takes Applications Offline After Malware Attack

Legal and business publisher Wolters Kluwer says it has discovered malware in a number of its platforms and applications and has taken them offline in order to reduce the malware’s impact. It has found no evidence that customer data was … Continue reading

Posted in Legal Marketing | Tagged , , , , , , | Leave a comment

Woman from China, with malware in tow, illegally entered Trump’s Mar-a-Lago

Enlarge (credit: The White House / Flickr) A woman carrying four cellphones, two Chinese passports, and a thumb drive containing malware was arrested over the weekend after gaining access to President Donald Trump’s Mar-a-Lago resort under false pretenses, a court … Continue reading

Posted in Technology & Cyberlaw | Tagged , , , , , , | Leave a comment

Ukraine detects new Pterodo backdoor malware, warns of Russian cyberattack

Enlarge (credit: Mira Mechtley ) The Computer Emergency Response Team of Ukraine (CERT-UA) and the Foreign Intelligence Service of Ukraine have detected a new strain of the Pterodo Windows backdoor targeting computers at Ukrainian government agencies, leading officials in Kiev to … Continue reading

Posted in Intellectual Property | Tagged , , , , , , , | Leave a comment

Another malware misattribution claim fails

PC Drivers Headquarters, LP v. Malwarebytes, Inc., 2018 WL 2996897, No. 18-CV-234-RP (W.D. Tex. Apr. 23, 2018)PC Drivers “offers software designed to help customers optimize the processing speed of their computers and identify software drivers ready to be updated.” Malwarebytes … Continue reading

Posted in Advertising Law | Tagged , , , , | Leave a comment

EFF and Lookout Uncover New Malware Espionage Campaign Infecting Thousands Around the World

“The Electronic Frontier Foundation (EFF) and mobile security company Lookout have uncovered a new malware espionage campaign infecting thousands of people in more than 20 countries. Hundreds of gigabytes of data has been stolen, primarily through mobile devices compromised by … Continue reading

Posted in Technology & Cyberlaw | Tagged , , , , , , , , | Leave a comment