Attackers are taking advantage of old vulnerabilities
FortiGuard Labs observed a 30 percent increase in mobile malware in the labs over the last six months. The team is now seeing more than 1,300 new samples per day, is currently …
Enterprises in denial regarding network security
Many enterprises possess an unrealistic confidence surrounding the security of their networks. According to a Lancope survey, more than 65 percent of IT/security professionals …
Cross-platform backdoor created with RAT available online
For malware authors and attackers, the ideal malware is that which works on as many platforms as possible. As Java is used in a wide variety of computing platforms, it stands …
Tor users targeted with spyware following anonymous Web-host shutdown
The news that the alleged owner of Freedom Hosting, the internet host for a great number of Tor hidden services, has been arrested and is accused of distributing and promoting …
Russians responsible for 30% of mobile malware
Lookout investigated 10 Russian-based organizations, uncovering that the mobile malware industry in Russia has become organized and profitable. These malware businesses …
FBI uses malware to spy on suspects via their phones
The FBI has been known to use malware to spy on suspects via their computers but mobile phones make even better sources of information. Just think about it: the great majority …
ZeroAcces rootkit dominates, adds new persistence techniques
According to a recent report by Alcatel-Lucent subsidiary Kindsight, as much as 10 percent of home networks and over 0.5 percent of mobile devices are infected with malware, …
Techniques malware authors use to evade detection
FireEye released a new report that reveals several techniques used by advanced malware to sidestep signature-based defenses during attacks. Today’s sophisticated, …
Cybergangs alter infrastructure abuse techniques
Phishing attack frequency declined 20 percent from Q4 2012 to Q1 2013, due to a precipitous drop in virtual server phishing attacks. APWG statistics indicate that phishing …
Panda Security updates Cloud Office Protection
Panda Security released Panda Cloud Office Protection (PCOP) 6.7, which will enable users to roll-out Panda Cloud Systems Management (PCSM) automatically on their network. …
Free first aid kit for computer viruses
Avira launched the Avira Rescue System, a software first aid kit for scanning and repairing PC computers that are already infected with malware. It can be downloaded for free …
Malware attacks via malicious iPhone chargers
Do you ever think twice about using someone else’s charger for recharging your iPhone? Well, you will now, as three Georgia Tech researchers have managed to install a …