Please turn on your JavaScript for this page to function normally.
Survey highlights ignorant IT behavior in the workplace

You receive a strange email. It looks shady. You’re probably being phished – a hacker is attempting to gain access to your enterprise. They must want to hijack …

Unofficial Android iMessage app can steal info and download malware

Android users who have dreamed about being able to use iMessage, Apple’s proprietary and free messaging solution, have been pleasantly surprised by the iMessage Chat for …

Major increase in Filecoder malware

The ESET HQ malware research lab is reporting an unusual spike in the actvity of Filecoder malware – Trojans that encrypt user files and try to extort a ransom from the …

A short overview of Android banking malware

As more and more people use their mobile phones to do their online banking, money transfers, and so on, cyber crooks wielding banking malware are increasingly turning to …

New wave of Shylock Trojan targets bank customers

Cybercrooks wielding the Caphaw (better known as Shylock) banking Trojan are once again targeting users of financial institutions around the world, warns Zscaler. The initial …

Beware of 419 scam emails delivered via CNN’s “Email This” feature

Email spammers often try to take advantage of current news and to impersonate legitimate news sites (usually CNN) in order to bypass spam filters and convince recipients to …

Chinese hackers for hire tied to Bit9 and Aurora attacks

The existence, the modus operandi and details of successful campaigns of another Chinese hacking group have been revealed by Symantec researchers, who have managed to tie to …

FBI confirms they were behind Freedom Hosting’s takeover

An FBI agent testifying at the court hearing where the subject of bail for Freedom Hosting owner Eric Eoin Marques was discussed has confirmed that the FBI has, indeed, had a …

Fake “new voicemail” notification targets Android WhatsApp users

Malware peddlers have decided to bank on the popularity of the WhatsApp cross-platform IM app for smartphones in order to get users to install malicious apps on their devices, …

Aggressive ransomware scam redirects to child porn

Getting denounced for viewing or owning child pornography is a huge deal in most Western world countries, so it’s no wonder that ransomware peddlers are using that …

Attacks targeting unsupported Java 6 are on the rise

As predicted at the end of 2012 and proved by the ever expanding use of exploit kits, vulnerabilities in popular and widespread software such as Java and Adobe’s Acrobat …

JollyBot SMS Trojan offered for use to low-level crooks via affiliate network

The current cybercrime market is all about Cybercrime-as-a-Service – knowledgeable individuals focus on their core competencies to offer services to those who have not …

Don't miss

Cybersecurity news