Please turn on your JavaScript for this page to function normally.
Techniques used in high-profile data breaches

McAfee Labs released a new report, highlighting the role of the “dark web” malware industry as a key enabler of the high-profile POS attacks and data breaches in …

Dendroid spying RAT malware found on Google Play

A new Android malware toolkit called Dendroid is being offered for sale by its creators, and at least one of the malicious APKs created with it has managed to fool Google …

New technique targets C code to spot malware attacks

Researchers from North Carolina State University have developed a new tool to detect and contain malware that attempts root exploits in Android devices. The tool improves on …

New Android devices sold with pre-installed malware

A wide range of smartphones and tablets manufactured by Samsung, Motorola, Asus and LG Electronics have apparently been compromised with malicious apps before being sold to …

Three-year-old Uroburos rootkit likely created by Russian state-sponsored hackers

Researchers from German antivirus company G Data have discovered and analyzed a complex rootkit with spying capabilities and believe that it has been created and employed by …

Four trillion security transactions reveal security highlights

In 2013, CYREN analyzed more than four trillion security transactions worldwide – averaging 10 to 15 billion transactions per day. There’s been a marked increase …

Zeus retrieves attack list hidden in sunset and cat images

Malware peddlers employing a new Zeus banking Trojan variant have resorted to hiding the malware’s configuration file into innocuous-looking sunset and cat photos, warns …

Mt. Gox users targeted with fake promises of lost Bitcoin recovery

Bitcoin exchange Mt. Gox has shared more details about the issues that have led to it filing for bankruptcy protection just as malware peddlers have started taking advantage …

Two of every five CryptoLocker victims pay the ransom

Ransomware is one of the most effective means for cyber crooks to “earn” themselves huge sums of money with practically no effort, which explains its popularity …

SpyEye and Tilon banking malware have the same author(s)

When first discovered by Trusteer in 2012, the Tilon banking malware received its name because of some similarities with the Silon banking Trojan. As Silon (and Zeus, and …

Bogus Whatsapp desktop app offer leads to malware

The popularity of the Whatsapp IM service is undisputed – hundreds of millions of users around the world are proof of that. And it is precisely this what makes the name …

Android Trojan delivered via Facebook “Suggested Posts”

Researchers have uncovered a potentially massive attack on Android users. This highly elaborate ploy originates on Facebook, where cyber-criminals advertise a series of apps. …

Don't miss

Cybersecurity news