Please turn on your JavaScript for this page to function normally.
Russia handed malware-laden devices to G20 delegates?

At the G20 summit held near St. Petersburg in September, attending delegates representing the 20 most powerful nations in the world have been handed gifts that included …

Fake Whatsapp notification delivers malware

WhatsApp is one of the most popular instant-messaging services out there, and its huge user base (over 300 million active users) makes Whatsapp-themed spam a great way to …

Researchers sinkhole several Cryptolocker C&Cs

The cyber crooks behind Cryptolocker, one of the latest ransomware threats, are having much success in infecting PC users with the deadly malware, but whether the victims fork …

PHP.net compromised to serve malware

On Thursday, Google’s Safe Browsing service began warning visitors to php.net that the website was discovered serving malware. Initially, most people and PHP maintainers …

Higher education networks 300% more likely to contain malware

OpenDNS researchers found that higher education networks are 300 percent more likely to contain malware than their enterprise and government counterparts. The study also …

Video: Malware Management Framework

You can throw lots of time and money at scanning your systems for unknown malware, but the reality is that you will only identify a small portion of the bad stuff. Changing …

Social identity theft protection

Riskive unveiled FriendGuard, a free app that leverages advanced math and science to protect individuals and families against social identity theft and malware attacking their …

Fraudware virus targeting Android users in China and South East Asia

NQ Mobile has identified, “Copycat App,” a new fraudware virus threat targeting Android users in China and several countries in South East Asia. “Copycat …

Video: Antivirus evasion techniques

This video from DerbyCon discusses the basics of the AV evasion problem, what techniques work, which ones don’t and why. The talk has a particular focus on AV evasion as …

Yara rules for leaked KINS toolkit

Just a few days ago, the source code of the famous KINS banking Trojan was leaked. KINS aims to infect as much computers as possible in order to steal credit cards, bank …

Bogus Facebook login page steals credentials, pushes malware

Symantec researchers have recently stumbled upon a phishing site that packs a double whammy: the site asks the user either to log into Facebook or to download an app in order …

Blackhole exploit kit creator arrested

It has been confirmed: the author of Blackhole, the most popular exploit kit out there, has been arrested by Russian authorities. The news that the malware creator that goes …

Don't miss

Cybersecurity news