Zeljka Zorz
Exploit kit with integrated AV checker
The latest version of the relatively new “Siberia Exploits Kit” has an interesting feature that must make it pretty popular among criminals – a built in AV …
WikiLeaks and Assange under attack
While WikiLeaks’ site is still being bombarded with requests at a speed of 10 gigabits per second – making access to it very difficult and at moments even …
Amazon profiles abused by spammers and malware pushers
Experience has proven that if a site enables users to contribute content, this feature will be abused by those who want to push their own agenda – usually spammers. This …
Facebook’s recurring nuisance – the recycled scam
Every now and then, a new Facebook scam pops up that takes advantage of the users’ curiosity and lures them in by promising to allow them to view who has visited their …
Malicious Kodak Galleries used for serving Trojan
A variant of a highly specialized Trojan has appeared on fake sites mimicking Kodak Gallery pages, where potential victims are urged to download software that would supposedly …
Ransomware abounds
Ransomware is any malware that manages to make a computer system or any of the files on it inaccessible to the user and asks him or her to pay up if they want to regain …
Behavior of Safari on the iPhone could benefit scammers
A behavior of the Safari browser on the iPhone could be used by phishers and scammers to fool users into believing they have landed on a legitimate site, says Nitesh Dhanjani. …
Fake Trojan Removal Kit runs ThinkPoint rogue
When looking for an anti-malware solution, it pays to be extra careful. Take the example of the “Trojan Removal Kit”. It is offered on fake security scan pages …
Experiment reveals how scammers earn huge money with simple scams
An interesting experiment conducted by UK-based scam-tracking organization Scam Detectives has revealed how online scams can earn scammers a lot of money in a short time …
Android browser flaw allows attackers to access user data
A vulnerability in the Android browser that could allow attackers to download files stored on the mobile device’s or tablet’s SD card has been discovered by …
Fake Facebook “photo comment” e-mail leads to malware
As Facebook has announced its new messaging system and its deployment in the coming months, online scammers have been trying to use that announcement against unsuspecting …
Release of diplomatic cables reveals Aurora attacks instigator
As Wikileaks was preparing to release part of the 250,000 diplomatic documents on Sunday, its operators alerted the public via their Twitter account that the whistleblowing …