Please turn on your JavaScript for this page to function normally.
Fake Amazon emails open the way for malware

The CVE-2012-4681 Java zero-day vulnerability might have been patched, but because it was added to the popular Blackhole exploit kit and because most users regularly forego …

76% of IT pros in the dark about unauthorized application downloads

While IT professionals recognize the dangers that unauthorized applications cause to their networks, most are letting these dangers go unnoticed, according to a survey by …

“Win 8 Security System” rogue AV spotted

Windows 8 has not yet been released and cyber crooks are already taking advantage of its name. McAfee researchers have recently spotted a new rogue AV solution dubbed …

Spoofed Microsoft notification leads to Zeus

Microsoft has updated its Services Agreement last week, and has begun notifying its users about the change via email. Eager to take advantage of any kind of legitimate opening …

The top Internet dangers for kids

As the Internet plays an increasingly prominent role in children’s lives, parents are getting increasingly worried about the ease with which undesirable content can be …

Virus shuts down gas company’s site and offices

The official website and the email servers of Ras Laffan Liquefied Natural Gas Company – the world’s second largest liquefied natural gas company which distributes …

Fake UPS notices deliver malware

Cyber crooks have once again resurrected the old UPS spam email campaign in order to deliver their malicious wares to Internet users, warns Webroot’s Dancho Danchev. As …

AV-killing worm spreads via Facebook chat and IM clients

A rather industrious piece of malware that – among other things – paves the way for other malware by disabling AV solutions and software update modules has been …

Kaspersky Lab publishes research about Wiper

In April 2012 a series of incidents were publicly reported about a destructive malware program, codenamed Wiper, which was attacking computer systems related to a number of …

Cross-platform Wirenet Trojan targets Mac and Linux users

Since Windows users constitute the majority of computer users around the world, most malware is designed to target that particular OS and software made for it. Still, every …

Cybercriminals use throw-away domains to infiltrate enterprise networks

The first six months of 2012 saw continued increases of malicious infection activity and an intensified danger of email-based attacks as cybercriminals increasingly employed …

Java 0-day exploit served from over 100 sites

The problem of the two unpatched Java zero-day vulnerabilities that are actively exploited in the wild by attackers looking to gain access to their targets’ computers is …

Don't miss

Cybersecurity news