Please turn on your JavaScript for this page to function normally.
Molerats attacks continue targeting US, EU, Middle East organizations

Not all RAT-wielding attackers come from China, say FireEye researchers. For over a year they have been following the activities of a group of hackers that uses the Poison Ivy …

International action against Gameover Zeus botnet and CyptoLocker ransomware

On Friday, 30 May 2014, law enforcement agencies from across the world, supported by the European Cybercrime Centre (EC3) at Europol, joined forces in a coordinated action led …

Malware creation breaks all records! 160,000 new samples every day

Malware creation has broken all records during this period, with a figure of more than 15 million new samples, and more than 160,000 new samples appearing every day, according …

Dissecting April’s malicious spam

Malicious attachments in April came disguised as e-greetings and notifications about faxes. In the case of the former, alleged Easter greetings turned out to be the …

Misconfiguration to blame for most mobile security breaches

Nearly 2.2 billion smartphones and tablets will be sold to end users in 2014 according to Gartner, Inc. While security incidents originating from mobile devices are rare, …

Hybrid Zberp Trojan targets bank users around the world

A new threat created by the amalgamation of the publicly available code of two of the most (in)famous malware around is targeting users of over 450 financial institutions …

Instant messaging Trojan spreads through the UK

Hundreds of computer systems have been infected with the latest instant messaging Trojan. Bitdefender has spotted an increasing wave of infections in the past week in …

Google Image Search results redirect to Browlock ransomware

Browlock is the most basic approach to ransomware there is: there is no actual malware that blocks the victims’ computer or encrypts its contents, there is only a Web …

iBanking Android malware disguised as legitimate apps

On underground cybercrime markets, iBanking is a well-known piece of malware, and one of the most expensive ones, too. “iBanking often masquerades as legitimate social …

Angler exploit kit starts wielding Silverlight exploits

“Silverlight exploits are the drive-by flavor of the month,” claim Cisco researchers. “Exploit Kit owners are adding Silverlight to their update releases, …

Fascinating MiniDuke backdoor hits again

MiniDuke – the extremely small and highly customized Asembler-based backdoor used in the past to target mostly government entities and institutions around the world …

Record month for Linux Trojans

If you think that you are protected from malware if you use Linux, think again, warn researchers from AV manufacturer Dr. Web, who identified and examined a record-high number …

Don't miss

Cybersecurity news