Poison Ivy RAT served by compromised Israeli website
The official website of the Israeli Institute for National Security Studies has been compromised and has been found serving a variant of the Poison Ivy remote administration …
Joint attack by banking Trojan and ransomware
The Citadel malware – a banking Trojan that is based on Zeus Trojan’s source code and whose creators have adopted a Software-as-a-Service approach when it comes to …
Fake PayPal payment notification leads to malware
PayPal might have passed the torch of the most phished brand to China’s Taobao.com, but that doesn’t mean that phishers and other scammers have stopped delivering …
Free, integrated antivirus and firewall solution
Check Point announced ZoneAlarm Free Antivirus + Firewall 2013 – a free Internet security solution that protects consumers against hackers, viruses, spyware, and …
Flashback botnet is a cash cow
We have all heard about the Flashback malware targeting machines running OS X and enslaving them into a botnet, but not a lot of attention has been given to the ultimate goal …
Incessant Blackhole spam runs likely made by same group
A seemingly never-ending string of spam email campaigns leading to websites hosting the infamous Blackhole exploit kit are hitting inboxes around the world in waves. The …
Securing smartphones and tablets against banking fraud
Trusteer announced a new version of the Trusteer Mobile service which prevents mobile and online banking fraud. The service detects mobile malware infection and helps bank …
Conficker paves the way for other malware
The recently released 12th volume of the Microsoft Security Intelligence Report has shown us that the Conficker worm is still alive and kicking, as it can be found on more …
Trojanized Grand Theft Audio for Android spotted
A Trojan masquerading as “Grand Theft Auto 10th Anniversary Edition” for Android has lately been spotted being offered on third-party Russian websites. More …
Gamex Trojan threatens Android users
A new Android Trojan that first paves the way for the download of other apps and them effects it has been spotted lurking on third-party websites, camouflaged as legitimate …
What’s in your daily slice of spam?
Just as the original spam – the tinned meat of 50 years ago – prompted people to wonder just what it contained, so too does the spam of the internet age. …
Mobile malware increasingly delivered via social networks
The growing use of mobile devices to connect with social networks is fast becoming a preferred method for cyber criminals to spread malware, particularly on those devices …