Please turn on your JavaScript for this page to function normally.
Trojan uses anti-spam system to keep in touch with C&C servers

Most malware is severely crippled if it can’t contact the C&C servers from which it receives its instructions and updates, so malware authors are constantly coming …

Cutwail botnet on spam rampage, delivers Cridex worm

Since its inception some six years ago, the Cutwail / Pandex botnet experienced its fair share of setbacks, but it’s still going strong. The main reason for its …

The arrival of the post-PC threat era

With the release of its 2012 Annual Roundup and Mobile Security reports, Trend Micro documents how cybercriminals have moved beyond the PC, targeting Android, social media and …

Employees targeted with fake DocuSign “confidential message”

An email purportedly sent by the DocuSign Electronic Signature Service on behalf of the administrative departments of a wide variety of organizations and businesses is hitting …

Skype becomes a malware minefield

Skype users should be careful when using the service these days. First CSIS researchers unearthed a campaign misusing Skype to replicate and spread the Shylock banking Trojan …

New RAT family makes its traffic look legitimate

RATs – Remote Access Trojans – are often used by cyber attackers to maintain a foothold in the infected computers and make them do things unbeknownst to their …

Cybercriminals exploit Java 0-day fears to serve malware

With all the recent Java zero-day vulnerabilities being exploited in the wild and Internet news outlets heavily covering the development of the situation, many users will look …

Microsoft AVs not good enough, says AV-Test

AV-Test, the well-known independent organization that tests security software for home and corporate users, has released the results of the latest testing – and …

Bogus “Payroll Declined” emails deliver malware

A malicious email campaign impersonating the Electronic Federal Tax Payment System (EFTPS) – a service offered by the U.S. Department of the Treasury that allows …

ThreatTrack 2.0 plugs malware holes in real-time

GFI Software launched GFI ThreatTrack 2.0, the latest version of the security intelligence solution that provides users with visibility into the threat landscape. It produces …

Bouncer kit perfect for laser-focused phishing campaigns

Researchers have unearthed a new type of phishing kit that allows crooks to target specific users and keep away others in order to keep the scheme hidden from knowing eyes and …

Automated YouTube account generator offered to cyber crooks

You’re a spammer / malware peddler / phisher, and want to register hundreds of bogus accounts on a popular online service such as YouTube in order to lead users to your …

Don't miss

Cybersecurity news