cybercriminals
Conficker targets photography lovers
People who bought a Hama-manufactured slide scanner from popular German retailer chain Tchibo in the weeks leading to Christmas are being warned about taking home more than …
IE zero-day used in targeted watering hole attacks
News that an Internet Explorer zero-day vulnerability was being and has been for quite some time been used in a new “watering hole” attack has livened the …
Most unique viruses of 2012
PandaLabs outlined its picks for the most unique viruses of the past year. Rather than a ranking of the most widespread viruses, or those that have caused most infections, …
Phishing techniques, consequences and protection tips
In this interview, Rohyt Belani, CEO at PhishMe, illustrates the magnitude of the phishing threat. He discusses techniques, consequences and protection tips. What happens once …
Mobile malware, botnets and attacks on the cloud to rise
ESET has published its annual review of the past year’s threat trends and compiled predictions for 2013. According to the new report, the 2013 threatscape will see major …
“Change Facebook color theme” scam leads to spying Chrome extension
The end of one year and the beginning of another strikes a lot of people as the perfect moment to change something in their life and start with the proverbial clean slate. …
Vulnerabilities in Java and Adobe to become main targets for cybercriminals
Software vulnerabilities will be the main target of cyber-criminals next year, according to a list of security trends that will dominate in 2013 by PandaLabs. “It is …
Sudoku puzzle generating spreadsheet carries malware
Sudoku lovers, beware! Your love for solving the popular puzzle could just be the right entrance point cyber criminals need to saddle you with information-stealing malware. …
“Facebook 2013 Demo app” leads to phishing
The offer of an app that supposedly allows users to view a new version of Facebook is the newest trick employed by phishers to get their hands on the users’ login …
Will the Sweet Orange exploit kit dethrone Blackhole?
There’s a new exploit kit being offered for sale and it seems to be slowly but surely gaining in popularity. Dubbed Sweet Orange, the kit uses exploits for Java, PDF, IE …
Exploits, security threats and hacks will mutate in 2013
Lamar Bailey, Director of Security Research and Development with nCircle, has released his top five security threats to watch out for in 2013. The New Year – and beyond …
Bogus LinkedIn invitations lead to info-stealer Trojan
Another round of LinkedIn-themed spam is hitting inboxes around the world, warns GFI. The email, sent from a bogus email address, urges the recipient to join the …