Mac and Windows users targeted with malicious “Failed delivery” emails
A widespread malware delivery campaign in the form of fake “undelivered courier item” emails is targeting both Windows and OS X users, warns Sophos. The emails in …
Cybersecurity predictions for 2014
The advent of new technologies, the widespread implementation of mobile and wireless communication and the increase in mobile adoption will open up new opportunities for …
Author of BlackPOS is a Russian teenager, researchers say
As the number of active attacks on US merchants continues to rise (we’re up to six now), InterCrawler CEO Andrew Komarov believes he has discovered the identity of the …
EFF staff targeted in state-sponsored espionage campaign
For the first time since the organisation’s inception, Electronic Frontier Foundation’s staffers have been hit with a targeted malware attack by what appear to be …
Researchers share more details about the Target POS malware
A handful of security companies have been researching the Target breach, and the information they unearthed is slowly trickling out to satisfy the public’s curiosity as …
Malware used in Target breach sold on underground forums
Target continues to be rather tight-lipped about the circumstances of the massive user data theft and the breach of their networks that made it possible, but the few details …
Scammers bypass protection mechanism, offer trojanized Minecraft Android app
Russian Android users who are looking to download the popular Minecraft game app from third-party app markets should be very careful, F-Secure researchers told PC Magazine, as …
Amazon and GoDaddy are the biggest malware hosters
The United States is the leading malware hosting nation, with 44 percent of all malware hosted domestically, according to Solutionary. The U.S. hosts approximately 5 times …
Mass-scale cleansing of co-opted computing devices
Cyber criminals are infecting innocent victims’ computing devices with crimeware at an alarming rate and with enormous costs. Technology solutions alone have not worked …
Sefnit Trojan endangers users even after removal
Remember when in late August 2013 the Tor anonymity network was hit with a sudden and massive influx of active clients connecting to it? It was later discovered that the spike …
Fake “Critical browser update” warnings lead to malware
If you have manually updated your browser in the last week or so, think back on how you did it. Did you look for the update yourself, or did you download one after being faced …
Bitcoin-stealing malware delivered via clever email campaign
Users of popular Bitcoin exchanges are being actively targeted by cyber crooks looking to syphon funds out of their digital wallets. When cyber crooks are looking to infect as …
Featured news
Resources
Don't miss
- Why we must go beyond tooling and CVEs to illuminate security blind spots
- Making security and development co-owners of DevSecOps
- Review: Passwork 7.0, self-hosted password manager for business
- What a mature OT security program looks like in practice
- Machine unlearning gets a practical privacy upgrade