Please turn on your JavaScript for this page to function normally.
Fake Intuit emails lead to malware

Emails purportedly sent by US tax preparation software and services company Intuit and professional social network LinkedIn have been hitting inboxes in the last week, posing …

Bogus wire rejection notices lead to exploit kit

Fake notices about a rejected wire transfer have been hitting inboxes around the world, trying to trick recipients to download the attached malicious file, Sophos warns. The …

World’s third largest botnet receives mortal blow

Grum, a botnet responsible for 17.4 percent of the world’s spam emails, finally seems to be dead. In the last few days, Dutch authorities have shut down two of the …

Android malware is booming

Trend Micro’s January prediction that some 11,000 pieces of Android malware will be detected by June this year has proved completely inaccurate, as the number of …

Fake Facebook photo tag notification leads to malware

Beware of fake Facebook emails telling you that you’ve been tagged in a photo, as you could easily end up infected with malware. The emails do visually resemble messages …

Cyber espionage campaign in the Middle East

Kaspersky Lab researchers announced the results of a joint-investigation with Seculert regarding Madi, an active cyber-espionage campaign targeting victims in the Middle East. …

Panda Cloud Antivirus 2.0 released

Panda Security launched Panda Cloud Antivirus 2.0 for both its Free and Pro editions. The new version is fully compatible with Windows 8 Release Preview and incorporates a new …

Norman updates Malware Analyzer G2 platform

Norman announced the new version of its Malware Analyzer G2 platform which delivers to analysts the latest automated analysis tools. Malware Analyzer G2 Version 3 delivers: …

Scareware targets users infected with industrial espionage worm

ACAD/Medre.A, a worm that steals AutoCAD drawings and sends them to remote servers, was recently discovered infecting a great number of computers in Peru and some other Latin …

Big brands utilized in malware distribution

Commtouch security analysts have seen substantial continued blending of big brand names with malware. Researchers named the following top seven brands that were abused in …

Majority of small businesses not confident in network security

More than half of IT administrators at small businesses would not bet their own money that all of the computers their business owns and employees use are free of malware (51%) …

The use of exploit kits changed spam runs

Spammers used to depend on email recipients to tie the noose around their own necks by inputing their personal and financial information in credible spoofs of legitimate …

Don't miss

Cybersecurity news