Zeljka Zorz
Banking Trojan disguised as innocuous Word and WinHelp files
Part of the job of a malware author is to constantly think up new ways of outsmarting researchers and bypassing automatic detection methods used by antivirus and other …
The War Z taken offline following forum, database hack
Players of The War Z, a first-person zombie survival game, have been notified of a breach of the developer’s (Hammerpoint Interactive) forum and game databases and the …
Fake “PayPal account deleted” emails doing rounds
A new email spam campaign targeting PayPal users is under way. The email subject line says the email contains an unread message from PayPal, but the email address from which …
US companies in China worried about data theft
The results of a survey conducted by the American Chamber of Commerce in China which polled 325 respondents currently doing business throughout the republic has shown that a …
Hackers attacking US banks are well-funded, expert says
The Cyber fighters of Izz Ad-Din Al Qassam hacker group – also known as Qassam Cyber Fighters – are at it again. For the third time in the last half year or so, …
Trojan phishes for credit card info through fake Facebook page
An insidious Trojan is targeting Facebook users and getting them to share confidential personal and credit card information that will then be used to perform fraudulent …
Ransomware uses browser history to persuade users to pay up
A new ransomware variant dubbed Kovter has been spotted trying out a brand new approach for convincing targeted users of the legitimacy of its claims. According a malware …
Spammers bypass spam filters with Google Translate links
Google Translate is the latest trick in spammers’ arsenal for bypassing email spam filters, warn Barracuda Labs researchers. Spam filters work by evaluating (among other …
US starts gradually removing Chinese IT equipment from federal systems
A new law concerning funds given to U.S. federal agencies has been signed by President Obama, and it says that Departments of Commerce and Justice, NASA, and the National …
Backdoor Trojan picks up commands from Evernote account
Trend Micro researchers have recently analyzed a backdoor Trojan that contacts an unusual command and control center – an Evernote account. The backdoor – dubbed …
Ideas for deterring cyber espionage attacks
There has been much talk about whether the cyber espionage attacks should be considered acts of war, and about what can be done to prevent them. Retaliation being hard to …
Massive DDoS attack targets Spamhaus
The DDoS attacks mounted against Spamhaus over a week ago have escalated in the last few days, reaching a never previously experienced level of some 300 gigabits per second at …
Featured news
Sponsored
Don't miss
- Cybercriminals used a gaming engine to create undetectable malware loader
- ESET researchers analyze first UEFI bootkit for Linux systems
- QScanner: Linux command-line utility for scanning container images, conducting SCA
- Choosing the right secure messaging app for your organization
- Zero-day data security