Please turn on your JavaScript for this page to function normally.
Business is booming for exploits, mobile malware

Business is thriving for exploits, mobile malware is still dominated by Android and Symbian, and botnets are back and retooled, according to a new threat report from F-Secure …

The rise of mobile advertising malware toolkits

In Q4 2012, FortiGuard Labs has highlighted malware samples that show four typical methods cybercriminals are using today to extract money from their victims. In addition, the …

Citadel Trojan used in unusual targeted attacks

The Zeus/Zbot banking malware and its variants and derivates (such as the Citadel Trojan) have, until now, been used for stealing banking credentials from random users. But …

Red October: The hunt for data

The recent discovery of the Red October malware has focused a lot on its effects, but inadequate attention has been given to its purpose – which successfully evaded …

Fake Booking.com warning leads to tons of malware

A massive spam campaign impersonating the popular online hotel reservations agency Booking.com is underway, trying to convince recipients to download a document supposedly …

Malicious Chrome extensions promoted via Facebook

Malicious Chrome extensions are lurking on the official Chrome Web Store, warns Kaspersky Lab Expert Fabio Assolini, and the campaign for leading users to them starts on …

ESET releases Mac security products

ESET launched new products for the OS X platform: ESET Cyber Security Pro and ESET Cyber Security. According to a recent Macworld magazine poll, only half of Mac users employ …

Aerospace and defense firms targeted with clever spear phishing

Directors, vice presidents and other top management of companies in the aerospace industry and U.S. government and defense contractors have recently been targeted with a …

Scareware trends and expected developments

While malware such as viruses, worms and Trojans strives to remain hidden from view for as long as possible, scareware (rogueware and ransomware) aims to be as noticeable and …

China-based hackers infiltrated New York Times’ network

The New York Times’ computer systems and network has been breached and its journalists’ private computers and email correspondence spied on for a period of four …

Malware controls 620,000 phones, sends costly messages

A new discovered malware is potentially one of the most costly viruses yet discovered. Uncovered by NQ Mobile, the “Bill Shocker” (a.expense.Extension.a) virus has …

FedEx-themed malicious emails bombarding inboxes

FedEx customers are constantly targeted with malicious emails supposedly coming from the global courier delivery service, but since the start of the year, FedEx-themed spam …

Don't miss

Cybersecurity news