Please turn on your JavaScript for this page to function normally.
Hijacking drones with malware

A recent incident at the White House showed that small aerial vehicles (drones) present a specific security problem. While in this particular case the actual danger turned out …

Evidence shows Regin spy malware is used by Five Eyes intelligence

Kaspersky Lab researchers who have recently analyzed a copy of the malicious QWERTY module have discovered that the malware is identical in functionality to a Regin malware …

Supposedly clean Office documents download malware

Bitdefender is warning Microsoft Office users against the emergence of a new spam campaign that is looking to trick antispam filters in order to allow spam to pass freely into …

Police ransomware scam drives UK teen to suicide

For most people, a ransomware infection is not a huge tragedy: they pay the bogus fine (or not), and ultimately get their computer back either because the criminals unlock it …

Click-fraud malware brings thousands of dollars to YouTube scammers

A malware delivery campaign aimed at making victims’ computers surreptitiously view YouTube videos and, consequently, artificially inflate their popularity so that …

Angler exploit kit goes after new Adobe Flash 0-day flaw

An exploit for a still officially unconfirmed zero-day vulnerability in Adobe Flash Player has been added to the popular Angler exploit kit and is, along with exploits for …

11% of Android banking and finance apps are dangerous

RiskIQ found that more than 40,000 of the 350,000 apps which reference banking in the world’s top 90 app stores contain malware or suspicious binaries. Meanwhile, of …

Gamers hit with trojanized versions of official League of Legends releases

Computer security experts often advise to users to download games, apps, documents, software and software updates directly from the original source (the manufacturer) or from …

The cost of malware containment

Enterprises spend $1.3 million a year dealing with false positive cyber security alerts, which equals nearly 21,000 hours in wasted time. The Ponemon Institute surveyed more …

New version of Cryptowall ransomware spotted doing rounds

The infamous Cryptowall ransomware is back: the newest version has been spotted compromising users starting on January 12. According to both Microsoft and the researcher that …

Beware of malware masquerading as Oracle security patches

Oracle is warning users about malware sites actively offering Oracle patches for download. “It has come to our attention that there are non-Oracle sites offering Oracle …

Skeleton Key malware makes all passwords valid

Researchers from the Dell Secureworks CTU team have unearthed a new type of malware whose goal is to allow attackers to bypass authentication on Active Directory (AD) systems …

Don't miss

Cybersecurity news