Please turn on your JavaScript for this page to function normally.
Android bug allows app code change without breaking signatures

Researchers from Bluebox Security have discovered a critical Android flaw that allows attackers to modify the code of any app without breaking its cryptographic signature, and …

Aggressive Android adware masquerading as Wi-Fi password cracking app

Statistics say that Android malware and aggressive adware is on the rise, so the fact that researchers occasionally find some of it on legitimate online app markets should not …

Darkleech Apache module injection campaign delivers malware

One of the most successful malware infection campaigns ever is still going strong, and researchers have not come closer to discovering how the attackers are compromising web …

System Doctor 2014: A fake AV for the upcoming year

In an effort to keep one step ahead of security solutions and attentive users, peddlers of fake AV solutions often change the name of the malware they are trying to sell. …

Cyber espionage moves out of the shadows

During the first half of 2013, AppRiver screened more than 15 billion messages, nearly 13 billion of which were spam and another 171 million that carried viruses. Once again, …

Litecoin-stealing Trojan found

Bitcoin is the most popular, but not the only crypto currency out there. As interest in and use of other ones rises, malware that tries to steal particular types of currencies …

Android hack tool harvests info from PCs

Stealing information is a piece of cake if you can manage to get malware on the target’s Windows computer, but did you know that it can also be as easy as connecting …

Symbiotic relationship ensures malware persistence

If your antivirus solution detects the Vobfus worm and downloader on your computer, chances are good that the machine also houses the Beebone downloader, Microsoft researcher …

Opera developers explain why malicious “update” wasn’t detected

Opera Software has finally come out with more details about the recent compromise of its internal infrastructure, the theft of an expired code signing certificate, and the …

Most Internet users have fallen victim to malware

The current state of cyber-security has left US Internet users anxious about hacks and password theft. Despite constant victimization, the majority are not using two-factor …

Opera infrastructure compromised, users hit with malicious update

A breach of the Opera Software internal infrastructure has resulted in the theft of an expired Opera code signing certificate and used it to sign a piece of malware, package …

Citadel Trojan automatically localizes fraud content

Any successful business knows that it cannot rely solely on one market for future growth. Software companies often conduct business in multiple international markets and …

Don't miss

Cybersecurity news