Please turn on your JavaScript for this page to function normally.
Top 12 scams of the holiday season

McAfee released its annual “12 Scams of Christmas” list to educate the public on the most common scams that criminals use during the holiday season to take …

Cryptolocker surge directly tied with Blackhole downfall

The recent emergence of Cryptolocker as one of the most widespread, visible and deadly threats is directly tied to the arrest of “Paunch”, the creator of the …

The complexity of Android malware is increasing

259 new mobile threat families and variants of existing families were discovered by F-Secure Labs in the third quarter of 2013, according to the a new mobile threat report for …

Malware analysts regularly investigate undisclosed data breaches

ThreatTrack Security published a study that reveals mounting cybersecurity challenges within U.S. enterprises. Nearly 6 in 10 malware analysts reported they have investigated …

Cybercriminals opting for real-time malware campaigns and phishing

The third quarter of 2013 saw further use of real-time malware campaigns and a dramatic increase in phishing sites, according to Commtouch. The ever-growing exploitation of …

Svpeng Android banking Trojan goes phishing

The Android banking Trojan known as Svpeng has been improved by its creators and is now capable to perform phishing attacks as well as stealing money directly from a …

Malware peddlers testing new infection techniques

An ongoing malicious spam campaign impersonating UPS has shown that malware peddlers are experimenting with different approaches for infecting hapless users, and additional …

Hypervisor-based, hardware-assisted system monitoring

In the last few years, many different techniques have been introduced to analyse malicious binary executables. Most of these techniques take advantage of Virtual Machine …

Kaspersky updates Small Office Security

Kaspersky Lab has announced a new version of Kaspersky Small Office Security, a security solution built specifically for businesses with fewer than 25 employees. This solution …

Triumfant detects and stops in-memory malware attacks

Advanced Volatile Threats are malware attacks that take place in a computer’s RAM or other volatile memory, and are difficult to detect because they are never stored to …

Google tests new Chrome feature for thwarting rogue plugins

A new feature that has been added to Google Canary is set to help users remove changes effected by malware that switches their homepage or injects ads into the sites their …

Cryptolocker crooks offer victims a second chance

The criminals behind Cryptolocker, the destructive ransomware that has lately been targeting mostly US and UK PC users, are trying to earn more money by offering users who …

Don't miss

Cybersecurity news