Please turn on your JavaScript for this page to function normally.
Examining the Nap malicious downloader

We recently encountered a stealthy malware that employs extended sleep calls to evade automated analysis systems capturing its behavior. It further makes use of the fast flux …

Ad network site hack results in popular sites flagged as malicious

Google Chrome users trying to visit a slew of popular news sites such as the New York Times, the Washington Post, ZDNet and the Huffington Post on Monday were faced with …

Fake Amazon Kindle receipt leads to persistent malware

Amazon customers buying e-books for their Kindle or other mobile devices should be careful with emails that seemingly containing receipts for their purchases, warns Webroot, …

Digital certificates and malware: a dangerous mix

In the past few days we have heard several stories about major corporations getting hacked and their security systems completely bypassed. If anything, that should remind us …

Business is booming for exploits, mobile malware

Business is thriving for exploits, mobile malware is still dominated by Android and Symbian, and botnets are back and retooled, according to a new threat report from F-Secure …

The rise of mobile advertising malware toolkits

In Q4 2012, FortiGuard Labs has highlighted malware samples that show four typical methods cybercriminals are using today to extract money from their victims. In addition, the …

Citadel Trojan used in unusual targeted attacks

The Zeus/Zbot banking malware and its variants and derivates (such as the Citadel Trojan) have, until now, been used for stealing banking credentials from random users. But …

Red October: The hunt for data

The recent discovery of the Red October malware has focused a lot on its effects, but inadequate attention has been given to its purpose – which successfully evaded …

Fake Booking.com warning leads to tons of malware

A massive spam campaign impersonating the popular online hotel reservations agency Booking.com is underway, trying to convince recipients to download a document supposedly …

Malicious Chrome extensions promoted via Facebook

Malicious Chrome extensions are lurking on the official Chrome Web Store, warns Kaspersky Lab Expert Fabio Assolini, and the campaign for leading users to them starts on …

ESET releases Mac security products

ESET launched new products for the OS X platform: ESET Cyber Security Pro and ESET Cyber Security. According to a recent Macworld magazine poll, only half of Mac users employ …

Aerospace and defense firms targeted with clever spear phishing

Directors, vice presidents and other top management of companies in the aerospace industry and U.S. government and defense contractors have recently been targeted with a …

Don't miss

Cybersecurity news