Android bug allows app code change without breaking signatures
Researchers from Bluebox Security have discovered a critical Android flaw that allows attackers to modify the code of any app without breaking its cryptographic signature, and …
Aggressive Android adware masquerading as Wi-Fi password cracking app
Statistics say that Android malware and aggressive adware is on the rise, so the fact that researchers occasionally find some of it on legitimate online app markets should not …
Darkleech Apache module injection campaign delivers malware
One of the most successful malware infection campaigns ever is still going strong, and researchers have not come closer to discovering how the attackers are compromising web …
System Doctor 2014: A fake AV for the upcoming year
In an effort to keep one step ahead of security solutions and attentive users, peddlers of fake AV solutions often change the name of the malware they are trying to sell. …
Cyber espionage moves out of the shadows
During the first half of 2013, AppRiver screened more than 15 billion messages, nearly 13 billion of which were spam and another 171 million that carried viruses. Once again, …
Litecoin-stealing Trojan found
Bitcoin is the most popular, but not the only crypto currency out there. As interest in and use of other ones rises, malware that tries to steal particular types of currencies …
Android hack tool harvests info from PCs
Stealing information is a piece of cake if you can manage to get malware on the target’s Windows computer, but did you know that it can also be as easy as connecting …
Symbiotic relationship ensures malware persistence
If your antivirus solution detects the Vobfus worm and downloader on your computer, chances are good that the machine also houses the Beebone downloader, Microsoft researcher …
Opera developers explain why malicious “update” wasn’t detected
Opera Software has finally come out with more details about the recent compromise of its internal infrastructure, the theft of an expired code signing certificate, and the …
Most Internet users have fallen victim to malware
The current state of cyber-security has left US Internet users anxious about hacks and password theft. Despite constant victimization, the majority are not using two-factor …
Opera infrastructure compromised, users hit with malicious update
A breach of the Opera Software internal infrastructure has resulted in the theft of an expired Opera code signing certificate and used it to sign a piece of malware, package …
Citadel Trojan automatically localizes fraud content
Any successful business knows that it cannot rely solely on one market for future growth. Software companies often conduct business in multiple international markets and …
Featured news
Sponsored
Don't miss
- Signatures should become cloud security history
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts