Please turn on your JavaScript for this page to function normally.
Fake AmEx alert leads to hard-to-detect malware

American Express customers are often targeted with malware-laden or phishing emails, mostly because when it comes to money and the potential loss of it, people automatically …

Symbian malware scene far from dead

F-Secure recently released the latest version of their Mobile Threat Report which covers Q3 2012. This is the executive summary related to Symbian threats. Despite …

Android malware continues to dominate the mobile threat landscape

F-Secure recently released the latest version of their Mobile Threat Report which covers Q3 2012. This is the executive summary related to Android threats. As expected, …

Most Android malware are SMS Trojans

Android versions 2.3.6, or ‘Gingerbread’, and 4.0.4, also known as ‘Ice Cream Sandwich’ were the most popular Android targets among cybercriminals in …

Vodafone customers targeted with malware disguised as MMS

If you are a Vodafone customer, be wary of emails seemingly sent by the service notifying you of a picture message you have allegedly received (click on the screenshot to …

“USPS delivery problem” spam leads to malware

If you are a regular user of the United States Postal Service, beware of fake emails seemingly coming from the company, telling you that they have failed to deliver one of …

GateWall Mail Security

rotects corporate environments from malware threats, spam and data loss issues. This software-based solution is installed within the corporate intranet and acts as a …

Image-stealing malware might lead to blackmailing attempts

Information-stealing malware targeting random computer users is usually geared towards stealing passwords and financial information by logging pressed keys and taking …

Georgia shows photos of Russian-based hacker spy

A Russian-based hacker has been unmasked as one of the attackers behind a long-standing campaign aimed at compromising computers belonging to Georgian ministries, parliament, …

Can the Nuclear exploit kit dethrone Blackhole?

In a market dominated by the mega-popular Blackhole exploit kit (newly upgraded to version 2.0) and the somewhat less sought-after Eleonore and Phoenix exploit packs, can the …

Malware authors turn to simpler detection evasion techniques

Given the huge amount of malware variants created each year, it is understandable that malware researchers count on automated threat analysis systems to single them out for …

Malicious “Your Photos” email from fake LinkedIn users

If you receive an email seemingly coming from a LinkedIn user, asking you to open an attachment in order to see “your photos” – don’t do it! Opening …

Don't miss

Cybersecurity news