Please turn on your JavaScript for this page to function normally.
Detect threat patterns across your web and mobile assets

During the Black Hat conference in Las Vegas, RiskIQ announced an automated platform with global reach that enables organizations to discover, scan for malware and gather …

Android RAT impersonates Kaspersky Mobile Security

A clever malware delivery campaign impersonating well-known AV vendor Kaspersky Lab is actively targeting Polish Android users. It all starts with a spam email sporting the …

How to foil SynoLocker and minimize the damage

We wrote on Monday warning about Synology NAS users being targeted with SynoLocker, a customized version of the Cryptolocker ransomware, which encrypts the files contained on …

Poweliks malware creates no files, lays low in the registry

For most malware, performing their malicious task(s) is the primary goal, and a close second is to stay unnoticed on the system for as long as possible. As developers of …

Synology NAS users hit with Cryptolocker variant

You know that your products are getting to be very popular when cybercriminals target users with a customized version of the Cryptolocker ransomware. The products in question …

Retailers warned of attacks using hard-to-spot PoS malware

Retailers, beware: cyber crooks are increasingly targeting remote desktop applications by brute-forcing passwords, and are using that access to plant hard-to-detect PoS …

Top 10 Facebook scams

American singer and actress Taylor Swift has lost her scam mojo, as her fake sex tape spreading on Facebook was excluded from the top ten most successful scams, according to …

Malicious USB device firmware the next big infection vector?

Researchers from German security consultancy SR Labs have created a whole new class of attacks that can compromise computer systems via ubiquitous and widely used …

PC gamers increasingly under attack

Many gamers either disable their security or remove it altogether, thereby sacrificing protection to maximize system performance and leaving themselves vulnerable to …

Android Fake ID bug allows malware to impersonate trusted apps

The Bluebox Security research team has unearthed another critical Android vulnerability. Named “Fake ID,” the security bug can be used by malicious applications to …

AV engines are riddled with exploitable bugs

A security researcher has found a great number of exploitable vulnerabilities in popular security solutions and the AV engines they use, proving not only that AV engines are …

Android ransomware attacks on the increase

CYREN researchers predict that a large wave of Android ransomware has yet to hit. Two cases of first-ever Android ransomware appeared thus far this year, both delivered via …

Don't miss

Cybersecurity news