Foreign journalists in China targeted with malware-laden emails
Foreign news correspondents stationed in China have recently become targets of two separate but similar malware attacks aimed at stealing information from their computers, …
The various spam campaigns leading to Blackhole
At any given time, there is a considerable number of email spam campaigns that ultimately lead users to pages hosting exploit kits – more often then not the extremely …
Android malware threats analysis
Bitdefender released its August 2012 Android malware threats report. While in August the percentage of adware-bundled apps dropped to 55.15 per cent, from July’s 77.34 …
Microsoft’s study into unsecure supply chains leads to botnet disruption
Microsoft’s Digital Crimes Unit has disrupted the functioning of yet another botnet by effecting a takedown of a domain which was also hosting over 500 different strains …
Blackhole 2.0 is out with new exploits and same price
A new version of BlackHole, one of the most popular exploit kits out there, has been made available by its creator, who has supposedly rewritten it from scratch. BlackHole 2.0 …
French energy company targeted with faulty malware
A researcher of Norwegian security firm Norman has recently come across and analyzed a peculiar malware sample that was likely aimed at compromising computers of employees of …
Jump in mobile app and banking scams
In August, GFI threat researchers identified a number of high-profile fake mobile application scams, along with a spike in email scams targeting UK banking and government …
Bogus GTA Vice City Android game leads to SMS Trojan
Offering bogus packs of popular games have always been a well-liked approach of malware peddlers around the world. GFI has recently spotted a fictitious Vice City version of …
Who is the most dangerous cyber celebrity?
Emma Watson has replaced Heidi Klum as McAfee’s 2012 most dangerous celebrity to search for online. For the sixth year in a row, McAfee researched popular …
Mobile malware has become a profitable industry
Lookout released its State of Mobile Security Report 2012 which explains the issues that individuals faced on mobile devices this year and explores the prominent trends in …
Zero-day-loving Google hackers furiously active in last three years
The hackers behind the Aurora attacks that were discovered targeting Google, Adobe and other big U.S. companies in 2009 have seemingly been working hard ever since. Symantec …
Shamoon attacks persist
While it still unknown whether the recent attacks against Saudi Aramco and RasGas were part of the so-called Shamoon attacks, the latter are continuing unabated, says …