Please turn on your JavaScript for this page to function normally.
Fake KLM e-tickets lead to malware

If you have recently booked a flight with KLM, please be careful when reviewing emails that appear to have been sent from the airline carrier, as rather legitimate-looking …

Malware targeting Skype missed a trick

Last week reports came out stating that the Dorkbot worm is now targeting Skype users. The worm fools users into downloading the malware, whose payload locks down machines. …

miniFlame discovered, designed for targeted cyber espionage

Kaspersky Lab announced the discovery of miniFlame, a small and highly flexible malicious program designed to steal data and control infected systems during targeted cyber …

Sophos updates free Virus Removal Tool

Sophos has updated its free Virus Removal Tool, now available here for download. The tool, designed to work alongside an existing anti-virus installation, removes viruses, …

Constant connectivity to social networks goes hand-in-hand with malware

In September, GFI threat researchers documented a number of cybercrime campaigns directed at users of various social networking sites including direct message spam on Twitter …

Ransomware adds audio component to force users to pay up

Not satisfied with just showing the fake FBI note, the criminals behind one of the many ransomware campaigns going on at the moment are trying to assault the users’ …

Proxy service users download malware, unknowingly join botnet

In yet another example of if-it’s-too-good-to-be-true-it-probably-isn’t, hundreds of thousands of users signing up for a cheap and supposedly legitimate proxy …

Surge in Android adware

Between the beginning of July and the end of September, FortiGuard Labs researchers reported a marked increase in Android adware, new evidence suggesting that Zitmo …

New TDL4 rootkit successfully hiding from AV

A new variant of TDL4 has been identified, and it is now ranked as the second most prevalent malware strains within two months since detection. The characteristics are similar …

Malware Forensics Field Guide for Windows Systems

If you are looking for a field guide that will help you identify malware on a Windows computer system, examine it, and determine its impact, than this book might be just the …

The danger behind low-volume email attacks

“Broad campaigns often spoof notifications from well-known businesses, establishments, organizations, and agencies, and are very widespread these days. However, smaller …

Info-stealing Trojan posing as Panda Cloud Antivirus

Researchers from Spanish antivirus vendor Panda Security are warning potential users about information-stealing malware disguised as their Panda Cloud Antivirus solution. The …

Don't miss

Cybersecurity news