Please turn on your JavaScript for this page to function normally.
The evolution of targeted attacks and exploit kits

There’s been a significant growth in cybercrime, via sophisticated targeted attacks and social media scams, as well as a rise in malicious email attachments, despite a …

Cybercriminals tailoring tactics for maximum appeal

GFI Software released its report on the most prevalent threat detections encountered during January. Last month saw malware attacks targeting a wide range of potential …

Update on the Kelihos botnet

Reports that the Kelihos botnet is back online and that its original operators are again trying to take over its reigns have been premature, says Microsoft. “Contrary to …

The state of cyberwar in the U.S.

As a country that is used to being dominant in the more traditional sense, the U.S. has been working to come to grips with a new sense of supremacy as a result of cyber …

Compromised DreamHost-hosted websites lead to scams

Hundreds of websites hosted by DreamHost have been compromised and are used to redirect users to a Russian scam page, warns Zscaler. Whether or not this is the result of the …

Server-side polymorphic Android apps

Server-side polymorphism as a technique to serve unique malware versions that evade signature-based detection to Windows users is used by many malware peddlers on a regular …

VeriSign hack: Reactions from the security community

VeriSign admitted it was hacked in 2010 and cannot identify what data was stolen. Below are comments on the situation that Help Net Security received from industry veterans. …

Malware redirects bank phone calls to attackers

Trusteer have discovered a concerning development in some new Ice IX configurations that are targeting online banking customers in the UK and US. Ice IX is a modified variant …

Fake Tumblr Staff Blog offers still targeting users

A week ago, compromised Tumblr accounts were sporting fake messages from a “Tumblr Staff Blog” offering Starbucks gift cards in return for completing surveys and …

Compromised WordPress sites lead to Phoenix exploit kit

Several hundred compromised websites that at first glance don’t appear to be malicious have been discovered by M86 researchers. The websites – mostly blogs and …

Keeping on top of financial malware

A lot of people are apprehensive about buying things and accessing their bank accounts online. It is an understandable fear, especially when one is aware that it takes just a …

Students used keyloggers on school computers, changed grades

Three Californian 16-year-olds have been arrested for having allegedly broken into their high school, stolen keys and tests, installed keyloggers onto teachers’ …

Don't miss

Cybersecurity news