New Zeus variant creates bogus Instagram accounts
If you are familiar with the results of a recently finished study regarding online content popularity that concluded that “likes” beget “likes”, the …
Advanced threats to drive growth in new product segment
As hackers have shifted their ultimate goals from disruption and notoriety to financial and intellectual property theft, the tactics they use have changed accordingly. The …
Cross-platform Frutas RAT delivered via targeted emails
The cross-platform Frutas RAT is being used in a new email phishing campaign targeting high-profile finance, mining, and telecom companies as well as governments in Europe and …
Where RFI attacks fall in the security threat landscape
New research from Incapsula yielded a few interesting facts about RFI attacks. The data for the report was collected by monitoring billions of web sessions over a 6-month …
Cyber crooks misuse Google service to control Android Trojans
Cybercriminals have been spotted using a novel method of controlling Android mobile malware: a legitimate service called Google Cloud Messaging. GCM has been created to allow …
Free Android anti-virus for mobile devices
Avira Free Android Security reached 2.0 and offers antivirus scanning and removal, as well as retaining the remote lock, wipe and “scream’ features available in …
Malicious ads lead to outdated adware-laden Firefox “update”
A series of Internet campaigns pushing bogus Firefox updates onto unwary users have been spotted by researchers, and among them is one that lures them in through “Green …
Protect against threats targeting Android
Palo Alto Networks’ WildFire malware analysis sandbox now is capable of analyzing Android applications in the APK file format to identify advanced threats in Android …
More apps exploiting Android “Master Key” bug found
Patches for the two recently discovered Android “Master Key” bugs are still to be pushed out by many mobile carriers and device manufacturers. In the meantime, …
Reveton changes tack, relies on fake AV
When it comes to the infamous Reveton ransomware, cyber crooks are forever coming up with additional ways to bilk money from users: pairing it up with banking Trojans, playing …
Linux banking Trojan offered for sale
Windows users are by far the most targeted ones by malware-wielding criminals, but that doesn’t mean that OS X and Linux users should feel impervious. In fact, RSA …
Expect more Android security issues in 2013
Android vulnerabilities, increased online banking threats and availability of sophisticated, inexpensive malware toolkits are among the growing concerns cited in Trend …
Featured news
Resources
Don't miss
- Cybersecurity in 2025: Global conflict, grown-up AI, and the wisdom of the crowd
- Ivanti Connect Secure zero-day exploited by attackers (CVE-2025-0282)
- The U.S. Cyber Trust Mark set to launch
- Mitel MiCollab, Oracle WebLogic Server vulnerabilities exploited by attackers
- Why an “all gas, no brakes” approach for AI use won’t work