Fake AmEx alert leads to hard-to-detect malware
American Express customers are often targeted with malware-laden or phishing emails, mostly because when it comes to money and the potential loss of it, people automatically …
Symbian malware scene far from dead
F-Secure recently released the latest version of their Mobile Threat Report which covers Q3 2012. This is the executive summary related to Symbian threats. Despite …
Android malware continues to dominate the mobile threat landscape
F-Secure recently released the latest version of their Mobile Threat Report which covers Q3 2012. This is the executive summary related to Android threats. As expected, …
Most Android malware are SMS Trojans
Android versions 2.3.6, or ‘Gingerbread’, and 4.0.4, also known as ‘Ice Cream Sandwich’ were the most popular Android targets among cybercriminals in …
Vodafone customers targeted with malware disguised as MMS
If you are a Vodafone customer, be wary of emails seemingly sent by the service notifying you of a picture message you have allegedly received (click on the screenshot to …
“USPS delivery problem” spam leads to malware
If you are a regular user of the United States Postal Service, beware of fake emails seemingly coming from the company, telling you that they have failed to deliver one of …
GateWall Mail Security
rotects corporate environments from malware threats, spam and data loss issues. This software-based solution is installed within the corporate intranet and acts as a …
Image-stealing malware might lead to blackmailing attempts
Information-stealing malware targeting random computer users is usually geared towards stealing passwords and financial information by logging pressed keys and taking …
Georgia shows photos of Russian-based hacker spy
A Russian-based hacker has been unmasked as one of the attackers behind a long-standing campaign aimed at compromising computers belonging to Georgian ministries, parliament, …
Can the Nuclear exploit kit dethrone Blackhole?
In a market dominated by the mega-popular Blackhole exploit kit (newly upgraded to version 2.0) and the somewhat less sought-after Eleonore and Phoenix exploit packs, can the …
Malware authors turn to simpler detection evasion techniques
Given the huge amount of malware variants created each year, it is understandable that malware researchers count on automated threat analysis systems to single them out for …
Malicious “Your Photos” email from fake LinkedIn users
If you receive an email seemingly coming from a LinkedIn user, asking you to open an attachment in order to see “your photos” – don’t do it! Opening …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?