Please turn on your JavaScript for this page to function normally.
Law enforcement targets users of BlackShades malware

During two days of operations taking place in more than 10 countries worldwide, coordinated by Eurojust in The Hague and supported by the European Cybercrime Centre (EC3) at …

Malvertising up by over 200%

Online Trust Alliance (OTA) Executive Director and President Craig Spiezle testified today before the U.S. Senate’s Homeland Security and Governmental Affairs Permanent …

Cybercriminals targeting unlikely sources to carry out high-profile exploits

Cybercriminals continuously discover more ways to successfully target new outlets for financial theft, according to Trend Micro. Greed is motivating cybercriminals to take a …

New browser hijacker/click fraud malware threatens Windows users

In its latest Security Intelligence Report, Microsoft has noted that malware designed to make money for the attacker via click fraud, performing Bitcoin mining, and …

The evolution of an Iranian hacker group

Iran-based hacker groups have traditionally concentrated more on website defacement and DDoS attacks aimed at making a political statement, but as time passes, some of those …

Epidemic of unknown malware on enterprise networks

Check Point has issued a report uncovering the major security events that occurred and impacted organizations across the world in 2013. The report is based on analysis of …

Key trends in cloud usage, risks and malware

Skyhigh Networks released the third edition of its quarterly Cloud Adoption and Risk Report. “With this report, we uncovered trends beyond the presence of shadow IT in …

Small businesses targeted with email-borne exploits

Even though the data gathered by Microsoft points to the fact that cybercriminals now prefer deceptive tactics to exploits, it does not mean that the latter approach has been …

Malware peddlers prefer deceptive tactics to exploits

Cyber crooks are losing interested in exploits as an attack vector, and are concentrating on deceptive downloads and ransomware as a means of earning/stealing money. The trend …

The prime target for malicious emails

In the first quarter of 2014 spammers started imitating messages from mobile applications. They especially like the popular mobile messengers – WhatsApp, Viber and …

Attackers rope DVRs in bitcoin-mining botnet in record time

How long does it take for one out of the box digital video recorder to be compromised with malware once the device has been connected to the Internet? The unfortunate answer …

2014 starts with record-breaking malware traffic

AppRiver released a detailed analysis of web and email-borne threats and malware trends traced between January and March 2014. During the first quarter of 2014, AppRiver …

Don't miss

Cybersecurity news