cybercriminals
Analysis of Poison Ivy remote access tool
A new FireEye report highlights the resurgence of Poison Ivy, a malware Remote Access Tool (RAT) that has remained popular and effective eight years after its original release …
The mobile cybercrime landscape is becoming more defined
McAfee found that Android-based malware achieved a 35 percent growth rate not seen since early 2012. This rebound was marked by the continued proliferation of SMS-stealing …
MitB malware targets steam
When cybercriminals use Man-in-the-Browser (MitB) malware to commit online fraud, financial institutions are not their only targets. Dating, eCommerce, hospitality, and travel …
Cross-platform Frutas RAT delivered via targeted emails
The cross-platform Frutas RAT is being used in a new email phishing campaign targeting high-profile finance, mining, and telecom companies as well as governments in Europe and …
Cyber crooks misuse Google service to control Android Trojans
Cybercriminals have been spotted using a novel method of controlling Android mobile malware: a legitimate service called Google Cloud Messaging. GCM has been created to allow …
Malicious ads lead to outdated adware-laden Firefox “update”
A series of Internet campaigns pushing bogus Firefox updates onto unwary users have been spotted by researchers, and among them is one that lures them in through “Green …
Reveton changes tack, relies on fake AV
When it comes to the infamous Reveton ransomware, cyber crooks are forever coming up with additional ways to bilk money from users: pairing it up with banking Trojans, playing …
Cross-platform backdoor created with RAT available online
For malware authors and attackers, the ideal malware is that which works on as many platforms as possible. As Java is used in a wide variety of computing platforms, it stands …
ZeroAcces rootkit dominates, adds new persistence techniques
According to a recent report by Alcatel-Lucent subsidiary Kindsight, as much as 10 percent of home networks and over 0.5 percent of mobile devices are infected with malware, …
Cybergangs alter infrastructure abuse techniques
Phishing attack frequency declined 20 percent from Q4 2012 to Q1 2013, due to a precipitous drop in virtual server phishing attacks. APWG statistics indicate that phishing …
How to spot and avoid SMS scams
2013 has been touted by Gartner as the year when mobile phones will overtake PCs as the most common Web access device worldwide. When you think about it, it’s logical, …
Spammers adapt and embrace popular themes
According to Kaspersky Lab, the percentage of spam in email traffic in June was up 1.4 percentage points and averaged at 71.1 per cent. Malicious attachments were found in 1.8 …
Featured news
Resources
Don't miss
- Hackers used Cisco zero-day to plant rootkits on network switches (CVE-2025-20352)
- Microsoft revokes 200 certs used to sign malicious Teams installers
- A new approach to blockchain spam: Local reputation over global rules
- SAP zero-day wake-up call: Why ERP systems need a unified defense
- “Perfect” Adobe Experience Manager vulnerability is being exploited (CVE-2025-54253)