Please turn on your JavaScript for this page to function normally.
Popular Windows downloader has secret DDoS capability

Unbeknownst to its users and perhaps even to its developers, the popular Windows download manager Orbit Downloader has been outfitted with a DDoS component. The Orbit …

Ransomware changes Windows login credentials

So far, ransomware has mostly been spotted targeting US, Canadian, Australian and European users, but its not limited to hitting citizens of these traditionally prosperous …

ZeroAccess developers continue to innovate

A while ago a group of researchers has analyzed and tested the resilience of P2P botnets, and has discovered that while Zeus and Sality botnets are highly resilient to …

Analysis of Poison Ivy remote access tool

A new FireEye report highlights the resurgence of Poison Ivy, a malware Remote Access Tool (RAT) that has remained popular and effective eight years after its original release …

The mobile cybercrime landscape is becoming more defined

McAfee found that Android-based malware achieved a 35 percent growth rate not seen since early 2012. This rebound was marked by the continued proliferation of SMS-stealing …

MitB malware targets steam

When cybercriminals use Man-in-the-Browser (MitB) malware to commit online fraud, financial institutions are not their only targets. Dating, eCommerce, hospitality, and travel …

New Zeus variant creates bogus Instagram accounts

If you are familiar with the results of a recently finished study regarding online content popularity that concluded that “likes” beget “likes”, the …

Advanced threats to drive growth in new product segment

As hackers have shifted their ultimate goals from disruption and notoriety to financial and intellectual property theft, the tactics they use have changed accordingly. The …

Cross-platform Frutas RAT delivered via targeted emails

The cross-platform Frutas RAT is being used in a new email phishing campaign targeting high-profile finance, mining, and telecom companies as well as governments in Europe and …

Where RFI attacks fall in the security threat landscape

New research from Incapsula yielded a few interesting facts about RFI attacks. The data for the report was collected by monitoring billions of web sessions over a 6-month …

Cyber crooks misuse Google service to control Android Trojans

Cybercriminals have been spotted using a novel method of controlling Android mobile malware: a legitimate service called Google Cloud Messaging. GCM has been created to allow …

Free Android anti-virus for mobile devices

Avira Free Android Security reached 2.0 and offers antivirus scanning and removal, as well as retaining the remote lock, wipe and “scream’ features available in …

Don't miss

Cybersecurity news