Please turn on your JavaScript for this page to function normally.
Cross-platform backdoor created with RAT available online

For malware authors and attackers, the ideal malware is that which works on as many platforms as possible. As Java is used in a wide variety of computing platforms, it stands …

ZeroAcces rootkit dominates, adds new persistence techniques

According to a recent report by Alcatel-Lucent subsidiary Kindsight, as much as 10 percent of home networks and over 0.5 percent of mobile devices are infected with malware, …

Cybergangs alter infrastructure abuse techniques

Phishing attack frequency declined 20 percent from Q4 2012 to Q1 2013, due to a precipitous drop in virtual server phishing attacks. APWG statistics indicate that phishing …

How to spot and avoid SMS scams

2013 has been touted by Gartner as the year when mobile phones will overtake PCs as the most common Web access device worldwide. When you think about it, it’s logical, …

Spammers adapt and embrace popular themes

According to Kaspersky Lab, the percentage of spam in email traffic in June was up 1.4 percentage points and averaged at 71.1 per cent. Malicious attachments were found in 1.8 …

DDoS attack size growing dramatically

Arbor Networks released data on DDoS attack trends for the first half of 2013. The data shows that DDoS continues to be a global threat, with a clear increase in attack size, …

FTC crackdown on “free gift card” scammers

The FTC has moved to shut down an international network of scammers that sent millions of unwanted text messages to consumers, using the lure of “free” gift cards …

Sharp increase in blended, automated attacks

FireHost announced its latest web application attack statistics, which track the prevalence of four distinct types of cyberattacks that pose the most serious threat to …

TOR-based botnets on the rise

Keeping their botnet’s C&C centers online is crucial for bot herders, so that they can keep taking advantage of the computers they zombified. But given that cyber …

A historical overview of the cyberattack landscape

Over the past 16 years, sensitive data and the complex IT infrastructure within Global 2000 enterprises used to create, distribute, and protect it has grown exponentially. …

Bogus AmEx notification leads to thorough phishing

American Express-themed phishing emails are never out of circulation, but it pays to know which new (or recycled) angle is being used at the moment. The latest one to hit …

Bogus “Royal Baby: Live Updates” email leads to malware

As expected, news of the new birth in the British Royal Family has become a perfect lure in malware delivery schemes. ThreatTrack has spotted an email titled “The Royal …

Don't miss

Cybersecurity news