Android Fake ID bug allows malware to impersonate trusted apps
The Bluebox Security research team has unearthed another critical Android vulnerability. Named “Fake ID,” the security bug can be used by malicious applications to …
AV engines are riddled with exploitable bugs
A security researcher has found a great number of exploitable vulnerabilities in popular security solutions and the AV engines they use, proving not only that AV engines are …
Android ransomware attacks on the increase
CYREN researchers predict that a large wave of Android ransomware has yet to hit. Two cases of first-ever Android ransomware appeared thus far this year, both delivered via …
A peek into Police Locker’s distribution infrastructure
An analysis of the distribution infrastructure for the bothersome Android “Police Locker” ransomware has revealed that the attackers behind it are not putting all …
Almost 1 in 10 Android apps are now malware
Cheetah Mobile Threat Research Labs analyzed trends in mobile viruses for Q1 and Q2 of 2014. Pulling 24.4 million sample files they found that 2.2 million files had viruses, …
New type of ransomware bucks established trends
Ransomware is now one of the fastest growing classes of malicious software, says Kaspersky Lab researcher Fedor Sinitsyn. This should not comes as a surprise, when we know …
Operation Emmental exploits holes in banking security
Trend Micro researchers have discovered and analyzed a clever attack aimed at customers of Austrian, Swiss, Swedish, and Japanese banks. They dubbed it Emmental, after the …
Android Simplocker ransomware hits English-speaking users
Simplocker, the first Android ransomware that actually encrypts files located on the device, has begun to target English-speaking users, ESET researchers warn. The initial …
Facebook scams now lead to exploit kits
The Facebook scam is a familiar phenomenon to every user of the popular social network, and most of them have fallen for it at one time or another as it only takes a moment of …
How Nigerian cyber criminals have evolved
Cyber criminals in Nigeria have evolved common malware campaigns to infiltrate businesses that have not previously been their primary targets, according to Palo Alto Networks. …
Funny Facebook video scam leaves unamusing Trojan
A new funny video spreading on Facebook leaves a not-so-hilarious Trojan in its wake on users’ computers, according to research by Bitdefender. The malware, believed to …
Mayhem malware ropes Linux, UNIX servers into botnets
A new malware that researchers have dubbed Mayhem is being used to target Linux and Unix web servers and has so far compromised over 1,400 Linux and FreeBSD servers around the …