Beware of Android Defender mobile scareware
Scareware aimed at mobile users is not nearly as ubiquitous as that directed at those who use Windows-run PCs. Nevertheless, there is some out there. Sophos’ Paul …
Can mobile malware be activated via sensors?
Can mobile malware be activated via sensors available on current mobile devices, and receive commands through out-of-band communication methods? If you ask a group of …
Brazilian govt sites found serving malware
Cyber crooks targeting Brazilian users have a well-documented predilection for banking Trojans, but every now and then they opt for other types of malware. Trend Micro …
Scanner identifies malware strains, could be future of AV
When it comes to spotting malware, signature-based detection, heuristics and cloud-based recognition and information sharing used by many antivirus solutions today work well …
Zeus variants are back with a vengeance
After analyzing the feedback from the company’s Smart Protection Network, Trend Micro researchers have noted an upswing in attempted Zeus / Zbot Trojan infections. After …
Fighting cybercrime is on the right track
Despite the numerous security incidents that took place during the first quarter of the year, the fight against cyber-crime is on the right track, according to PandaLabs. …
The dangers of downloading software from unofficial sites
Because malware peddlers often bundle their malicious wares with legitimate software, downloading anything from unofficial download sites is a bit like playing Russian …
“NATO vacancies” phishing email also leads to malware
An interesting and very comprehensive phishing and malware-delivery campaign has been spotted by Webroot researchers. The attackers are posing as the chief of NATO’s …
Sourcefire goes beyond the sandbox
Sourcefire introduced malware trajectory capabilities across its Advanced Malware Protection portfolio, giving customers visibility into malware attack activity and enabling …
Cyber espionage campaign uses professionally-made malware
Trend Micro researchers have discovered a new, massive cyber espionage campaign that has been hitting as many as 71 victims each day, including government ministries, …
Form-grabbing rootkit sold on underground forums
There seemingly no end to the automated tools that aspiring cyber crooks can buy on underground forums. The latest of these discovered by Webroot’s Dancho Danchev is …
New Mac spyware signed with legitimate Apple Developer ID
A new piece of malware designed to spy on Mac users has been unearthed by security researcher and hacker Jacob Appelbaum at the Oslo Freedom Conference held this week in …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?