Please turn on your JavaScript for this page to function normally.
Which malware lures work best?

“More often than not, malware peddlers’ main goal is to deliver their malicious wares to the maximum number of users possible. Choosing the right lure is crucial …

15,000 spam emails have hit the inboxes of Android users in recent days

“Thousands of Android users are at risk of having their mobile devices and private contents locked by a particularly ruthless ransomware that demands $500 to restore …

Millions of users installed malicious Minecraft apps from Google Play

“Since August 2014, Minecraft lovers who like to play the popular game on their Android phones have been targeted with apps that are purportedly cheats for the game, but …

Malware upsurge threatens millions of POS devices

Notable brands like Target, Neiman Marcus, PF Changs, Staples, Michaels Stores, and Home Depot have all have become victims of point of sale (POS) security breaches targeting …

A first aid kit for ransomware infections

“You’ve been hit by ransomware and you don’t know what to do? Jada Cyrus has assembled a helpful “Ransomware Removal Kit” which contains …

Trojanized, info-stealing PuTTY version lurking online

“A malicious version of the popular open source Secure Shell (SSH) client PuTTY has been spotted and analyzed by Symantec researchers, and found to have …

How much money do cyber crooks collect via crypto ransomware?

“FireEye researchers have calculated that the cybercriminals wielding TeslaCrypt and AlphaCrypt have managed to extort $76,522 from 163 victims in only two months. …

Global black markets and the underground economy

Adam Tyler is the Chief Innovative Officer at CSID. In this interview he discusses global black markets, what type of information is most valuable for cybercriminals, modern …

Rogue GTA 5 mods carry password-stealing malware

“Gamers who choose to play Grand Theft Auto V (GTA 5) on their PC should be carefull not to install two game mods that have been found to be bundled with malware. …

Rombertik’s disk wiping mechanism is aimed at pirates, not researchers

Rombertik, the information-stealing malware that was recently analyzed by Cisco researchers and which apparently tries to prevent researchers from doing so by rewriting the …

WinYahoo adware changes your Chrome secure preferences

“Potentially unwanted programs (PUPs) might not be as dangerous as malware, but can often lead to unexpected perils. Take for example WinYahoo. Despite it’s name …

APT group’s malware retrieved C&C IP addresses from Microsoft’s TechNet portal

“A China-based APT group has been using Microsofts TechNet web portal to host encoded Command and Control IP addresses for its BLACKCOFFEE malware, FireEye researchers …

Don't miss

Cybersecurity news