Please turn on your JavaScript for this page to function normally.
Microsoft disrupts malware networks and APT operations

Microsoft’s Digital Crimes Unit struck again, and was allowed to seize 23 free domain names in an effort to strike a fatal blow to malware delivery networks run by a …

Number and diversity of phishing targets continues to increase

The number of phishing sites in the first quarter of 2014 leaped 10.7 percent over the previous quarter, the Anti-Phishing Working Group reports. 2013 was one of the heaviest …

Banking malware sniffs out data sent over HTTPS

Careful online banking users can sometimes spot that something is amiss when malware installed on their computer pops up phishing pages or adds fields to legitimate banking …

How does a rogue ad network function?

It’s a well known fact that a considerable chunk of Internet traffic is bogus, made by infected computers that visit sites and click on adverts chosen by malicious …

Invasive Selfmite SMS worm uncovered

AdaptiveMobile has discovered a previously unknown piece of mobile malware dubbed Selfmite. It spreads via SMS and fools users into installing a worm app which propagates by …

Atypical cloned banking app pops up on Google Play

An unusual instance of a cloned banking app has been spotted on Google Play by Lookout researchers: the app steals only the users’ ID, and leaves alone the password. The …

Banking fraud campaign steals 500k euros in a week

The experts at Kaspersky Lab have discovered evidence of a targeted attack against the clients of a large European bank. According to the logs found in the server used by the …

Capabilities of “lawful interception” mobile malware revealed

Researchers from Russian AV company Kaspersky Labs and the Citizen Lab of the University of Toronto have released details about the mobile surveillance tools provided by …

Havex malware targets ICS/SCADA systems

F-Secure researchers have, for a while now, been monitoring the spreading of the Havex malware family and have been trying to determine who are the attackers that wield it. …

Cybercriminals exploit trusted app and service vulnerabilities

The manipulation of legitimate mobile apps and services played a key role in the expansion of mobile malware at the beginning of 2014. McAfee Labs found that 79 percent of …

Bitcoin miner lurking on Facebook

Facebook users, beware: a new viral campaign aimed at saddling you with a Bitcoin mining Trojan has been spotted. “The virus spreads through private Facebook messages, …

Password protected Zbot malware in the wild

Early this morning a small malware campaign started up claiming to be daily customer statements from Berkeley Futures Limited (real company, but messages are spoofed). The …

Don't miss

Cybersecurity news