Dorkbot worm lurks on Skype and MSN Messenger again
The Dorkbot/Rodpicom worm, which spreads via messaging applications and leads to additional malware infections, is currently doing rounds on Skype and MSN Messenger, warns …
Bogus cleaning apps on Google Play install backdoor on PCs
Malicious Android apps able to infect and set up a backdoor on PCs running pre-Windows 7 operating systems have been recently spotted by researchers of several security …
Children turning into malicious code developers
In a world filled with laptops, tablets and smartphones, today’s children become digitally fluent far earlier than previous generations. Now, AVG has found evidence that …
Whitehole exploit kit in the spotlight
The effectiveness of exploit kits has made them malware peddlers’ preferred way of distributing their malicious wares. The Blackhole exploit kit is, by far, the most …
Nearly a third of all computers are infected with malware
PandaLabs released its annual security report which details an extremely interesting year of data theft, social networking attacks and cyber-warfare. The most devastating …
Banking Trojan posing as Avast AV
A banking Trojan masquerading as the popular free AV solution from Avast has been spotted on computers of Brazilian users, reports Kaspersky Lab Expert Dmitry Bestuzhev. The …
Examining the Nap malicious downloader
We recently encountered a stealthy malware that employs extended sleep calls to evade automated analysis systems capturing its behavior. It further makes use of the fast flux …
Ad network site hack results in popular sites flagged as malicious
Google Chrome users trying to visit a slew of popular news sites such as the New York Times, the Washington Post, ZDNet and the Huffington Post on Monday were faced with …
Fake Amazon Kindle receipt leads to persistent malware
Amazon customers buying e-books for their Kindle or other mobile devices should be careful with emails that seemingly containing receipts for their purchases, warns Webroot, …
Digital certificates and malware: a dangerous mix
In the past few days we have heard several stories about major corporations getting hacked and their security systems completely bypassed. If anything, that should remind us …
Business is booming for exploits, mobile malware
Business is thriving for exploits, mobile malware is still dominated by Android and Symbian, and botnets are back and retooled, according to a new threat report from F-Secure …
The rise of mobile advertising malware toolkits
In Q4 2012, FortiGuard Labs has highlighted malware samples that show four typical methods cybercriminals are using today to extract money from their victims. In addition, the …
Featured news
Resources
Don't miss
- Kata Containers: Open-source container runtime, building lightweight VMs
- Why software is the key to FI risk management
- Hottest cybersecurity open-source tools of the month: December 2024
- The sixth sense of cybersecurity: How AI spots threats before they strike
- reconFTW: Open-source reconnaissance automation