Symbian malware scene far from dead
F-Secure recently released the latest version of their Mobile Threat Report which covers Q3 2012. This is the executive summary related to Symbian threats. Despite …
Android malware continues to dominate the mobile threat landscape
F-Secure recently released the latest version of their Mobile Threat Report which covers Q3 2012. This is the executive summary related to Android threats. As expected, …
Most Android malware are SMS Trojans
Android versions 2.3.6, or ‘Gingerbread’, and 4.0.4, also known as ‘Ice Cream Sandwich’ were the most popular Android targets among cybercriminals in …
Vodafone customers targeted with malware disguised as MMS
If you are a Vodafone customer, be wary of emails seemingly sent by the service notifying you of a picture message you have allegedly received (click on the screenshot to …
“USPS delivery problem” spam leads to malware
If you are a regular user of the United States Postal Service, beware of fake emails seemingly coming from the company, telling you that they have failed to deliver one of …
GateWall Mail Security
rotects corporate environments from malware threats, spam and data loss issues. This software-based solution is installed within the corporate intranet and acts as a …
Image-stealing malware might lead to blackmailing attempts
Information-stealing malware targeting random computer users is usually geared towards stealing passwords and financial information by logging pressed keys and taking …
Georgia shows photos of Russian-based hacker spy
A Russian-based hacker has been unmasked as one of the attackers behind a long-standing campaign aimed at compromising computers belonging to Georgian ministries, parliament, …
Can the Nuclear exploit kit dethrone Blackhole?
In a market dominated by the mega-popular Blackhole exploit kit (newly upgraded to version 2.0) and the somewhat less sought-after Eleonore and Phoenix exploit packs, can the …
Malware authors turn to simpler detection evasion techniques
Given the huge amount of malware variants created each year, it is understandable that malware researchers count on automated threat analysis systems to single them out for …
Malicious “Your Photos” email from fake LinkedIn users
If you receive an email seemingly coming from a LinkedIn user, asking you to open an attachment in order to see “your photos” – don’t do it! Opening …
Why mobile malware is big in China and Russia
According to Lookout’s State of Mobile Security Report 2012, “Toll Fraud” malware has become the most prevalent type of malware within the past year due to …
Featured news
Resources
Don't miss
- Hawk Eye: Open-source scanner uncovers secrets and PII across platforms
- The Zoom attack you didn’t see coming
- Sonicwall SMA100 vulnerability exploited by attackers (CVE-2021-20035)
- The UK’s phone theft crisis is a wake-up call for digital security
- Securing digital products under the Cyber Resilience Act