Please turn on your JavaScript for this page to function normally.
Japanese cops collar malware-carrying cat

When imagining law enforcement officers investigating and searching for cyber criminals or evidence about their activities, the last thing that you can probably envision is …

Cybercriminals mostly targeting LinkedIn, PayPal and Amazon

GFI Software released a collection of the most prevalent threat detections encountered last month. In December, GFI threat researchers found a handful of phony Google Play app …

ENISA summarizes 120 threat reports, identifies top trends

The EU’s cyber security agency ENISA has published the first Cyber Threat Landscape analysis of 2012, summarizing over 120 threat reports. The report identifies and …

McAfee says he used malware to spy on Belize authorities

John McAfee’s name is well-known in the information security industry, but until very recently, most of the general public didn’t know that he had long ago stopped …

Conficker targets photography lovers

People who bought a Hama-manufactured slide scanner from popular German retailer chain Tchibo in the weeks leading to Christmas are being warned about taking home more than …

The threat landscape continues to expand rapidly

ThreatMetrix announced cybersecurity trends and risks businesses and consumers must keep top of mind in 2013. These include cyberwarfare, data breaches, migrating malware, …

Trends in mobile ransomware, large-scale attacks and hacktivism

McAfee today released its annual 2013 Threat Predictions report, highlighting the top threats McAfee Labs foresees for 2013. In the coming year, McAfee Labs expects that …

Most unique viruses of 2012

PandaLabs outlined its picks for the most unique viruses of the past year. Rather than a ranking of the most widespread viruses, or those that have caused most infections, …

Mobile malware, botnets and attacks on the cloud to rise

ESET has published its annual review of the past year’s threat trends and compiled predictions for 2013. According to the new report, the 2013 threatscape will see major …

Sudoku puzzle generating spreadsheet carries malware

Sudoku lovers, beware! Your love for solving the popular puzzle could just be the right entrance point cyber criminals need to saddle you with information-stealing malware. …

Bogus LinkedIn invitations lead to info-stealer Trojan

Another round of LinkedIn-themed spam is hitting inboxes around the world, warns GFI. The email, sent from a bogus email address, urges the recipient to join the …

Apache malware targeting online banking

Analysis of a malicious Apache module, detected by ESET as Linux/Chapro.A, found that the world’s most widely used web server, Apache, is being used to carry out these …

Don't miss

Cybersecurity news