Please turn on your JavaScript for this page to function normally.
Thousands of compromised Apache servers direct users to malware

What do the recent compromises of a number of LA Times websites and the blog of hard disk drive manufacturer Seagate have in common? According to several security researchers, …

Banking Trojan disguised as innocuous Word and WinHelp files

Part of the job of a malware author is to constantly think up new ways of outsmarting researchers and bypassing automatic detection methods used by antivirus and other …

Aggressive Android adware and malware on the rise

With adware gleaning more user data from people devices than they would normally need too and developers bundle more than one adware framework into their apps, user privacy is …

Trojan phishes for credit card info through fake Facebook page

An insidious Trojan is targeting Facebook users and getting them to share confidential personal and credit card information that will then be used to perform fraudulent …

Ransomware uses browser history to persuade users to pay up

A new ransomware variant dubbed Kovter has been spotted trying out a brand new approach for convincing targeted users of the legitimacy of its claims. According a malware …

Complex malware and BYOD drive mobile security

Mobile malware has advanced to a new level of sophistication as smart devices continue to gain ground. The number of unique mobile threats grew by 261% in just two quarters. …

8 in 10 companies suffered web-borne attacks

The vast majority of organizations that allow employees to freely access the Web are experiencing high rates of malware threats, including phishing attacks, spyware, …

Backdoor Trojan picks up commands from Evernote account

Trend Micro researchers have recently analyzed a backdoor Trojan that contacts an unusual command and control center – an Evernote account. The backdoor – dubbed …

Malware analysis: Collaboration, automation and training

Whether you’re a novice or a professional at analyzing malicious code, you’ll have a desire to learn or pass on that skill. Most malicious code analysis is …

Activists now targeted with trojanized backdoor apps

Phishing emails targeting Tibetan and Uyghur activists and containing spying malware masquerading as legitimate DOC and PDF files are nothing new, as such spam campaigns have …

Real-time apps and FTP are preferred malware targets

Palo Alto Networks published an analysis of new and evasive malware in live enterprise networks. Their findings show that traditional antivirus solutions are not identifying …

Fake BBC emails lead to Blackhole, Zeus

Spam emails supposedly coming from CNN and the BBC and delivering links to trending news stories have once again become the preferred way for malware peddlers to lure …

Don't miss

Cybersecurity news