Please turn on your JavaScript for this page to function normally.
Malicious Kodak Galleries used for serving Trojan

A variant of a highly specialized Trojan has appeared on fake sites mimicking Kodak Gallery pages, where potential victims are urged to download software that would supposedly …

Ransomware abounds

Ransomware is any malware that manages to make a computer system or any of the files on it inaccessible to the user and asks him or her to pay up if they want to regain …

Behavior of Safari on the iPhone could benefit scammers

A behavior of the Safari browser on the iPhone could be used by phishers and scammers to fool users into believing they have landed on a legitimate site, says Nitesh Dhanjani. …

Fake Trojan Removal Kit runs ThinkPoint rogue

When looking for an anti-malware solution, it pays to be extra careful. Take the example of the “Trojan Removal Kit”. It is offered on fake security scan pages …

Experiment reveals how scammers earn huge money with simple scams

An interesting experiment conducted by UK-based scam-tracking organization Scam Detectives has revealed how online scams can earn scammers a lot of money in a short time …

Android browser flaw allows attackers to access user data

A vulnerability in the Android browser that could allow attackers to download files stored on the mobile device’s or tablet’s SD card has been discovered by …

Fake Facebook “photo comment” e-mail leads to malware

As Facebook has announced its new messaging system and its deployment in the coming months, online scammers have been trying to use that announcement against unsuspecting …

Release of diplomatic cables reveals Aurora attacks instigator

As Wikileaks was preparing to release part of the 250,000 diplomatic documents on Sunday, its operators alerted the public via their Twitter account that the whistleblowing …

Student pleads guilty to helping organize Anonymous DDoS attacks

Steve Slayo, a 19-year old Australian student, has pleaded guilty to having organized a DDoS attack targeting – among others – the websites of the Australian Prime …

Vinself – a backdoor for corporate networks?

A new backdoor that has seemingly been developed to compromise corporate networks has been discovered by FireEye‘s researcher Atif Mushtaq, and made him speculate that …

Spear phishing campaign targeted e-mail marketers and their customers

For months now, a massive spear phishing campaign has been targeting employees of over 100 e-mail service providers, with the goal of compromising their computers and those of …

Scottish botnet master sentenced

Matthew Anderson – the Scottish botnet master who was found guilty of organizing a campaign that saw computers enslaved in a botnet, stealing data from their owners and …

Don't miss

Cybersecurity news