Please turn on your JavaScript for this page to function normally.
Banking Trojan disguised as innocuous Word and WinHelp files

Part of the job of a malware author is to constantly think up new ways of outsmarting researchers and bypassing automatic detection methods used by antivirus and other …

The War Z taken offline following forum, database hack

Players of The War Z, a first-person zombie survival game, have been notified of a breach of the developer’s (Hammerpoint Interactive) forum and game databases and the …

Fake “PayPal account deleted” emails doing rounds

A new email spam campaign targeting PayPal users is under way. The email subject line says the email contains an unread message from PayPal, but the email address from which …

US companies in China worried about data theft

The results of a survey conducted by the American Chamber of Commerce in China which polled 325 respondents currently doing business throughout the republic has shown that a …

Hackers attacking US banks are well-funded, expert says

The Cyber fighters of Izz Ad-Din Al Qassam hacker group – also known as Qassam Cyber Fighters – are at it again. For the third time in the last half year or so, …

Trojan phishes for credit card info through fake Facebook page

An insidious Trojan is targeting Facebook users and getting them to share confidential personal and credit card information that will then be used to perform fraudulent …

Ransomware uses browser history to persuade users to pay up

A new ransomware variant dubbed Kovter has been spotted trying out a brand new approach for convincing targeted users of the legitimacy of its claims. According a malware …

Spammers bypass spam filters with Google Translate links

Google Translate is the latest trick in spammers’ arsenal for bypassing email spam filters, warn Barracuda Labs researchers. Spam filters work by evaluating (among other …

US starts gradually removing Chinese IT equipment from federal systems

A new law concerning funds given to U.S. federal agencies has been signed by President Obama, and it says that Departments of Commerce and Justice, NASA, and the National …

Backdoor Trojan picks up commands from Evernote account

Trend Micro researchers have recently analyzed a backdoor Trojan that contacts an unusual command and control center – an Evernote account. The backdoor – dubbed …

Ideas for deterring cyber espionage attacks

There has been much talk about whether the cyber espionage attacks should be considered acts of war, and about what can be done to prevent them. Retaliation being hard to …

Massive DDoS attack targets Spamhaus

The DDoS attacks mounted against Spamhaus over a week ago have escalated in the last few days, reaching a never previously experienced level of some 300 gigabits per second at …

Don't miss

Cybersecurity news