Facebook partners with security vendors, offers free AV
Facebook has announced that it’s partnering with five top security companies and it will be offering downloads of their anti-virus solutions on a newly created AV …
Macs harbor both Mac and Windows malware
Have the predictions made yearly by many security firms finally come true? Will Mac users be forced to invest in a good antivirus solution? According to the latest numbers …
First portable malware intelligence system
ValidEdge has unveiled a real-time malware analysis engine built into a standard laptop, delivering the power to analyze up to 1000 malware samples per day in a fully …
Fake warning about Olympic-themed scams carries malware
It’s three months to go until the start of the London Olympics 2012, and sports fans are searching for and buying tickets to the various events online. Unfortunately, …
Phishing and malware meet cheque fraud
Trusteer recently uncovered a scam in an underground forum that shows how data obtained through phishing and malware attacks can be used to make one of the oldest forms of …
SpyEye botnet for sale at bottom price
A drop in the price asked for the latest version of the SpyEye botnet has security researchers worrying that users might soon be targeted with an increasing amount of …
Highly compelling spam campaign delivers malware
A spam email campaign that may trick a lot of users opening the malicious attachment has been spotted by Sophos. Variations of “RE:Check the attachment you have to react …
Fake “Steam Cracker” steals user credentials
Users of Valve’s Steam game platform are once again targeted by malware peddlers, and this time the lure is a “Steam Cracker”. The cracker is being offered …
DarkComer RAT disguised as Skype encryption software
A while ago, Syrian dissidents claimed that the government uses malware to spy on them. The malware was delivered through compromised email accounts of other opposition …
How cybercriminals are infecting networks
Research by Websense reveals the trifecta that is driving epidemic levels of data theft: 1) extremely effective social media lures 2) evasive and hard-to-detect infiltration …
Spam campaign combines phishing, malware and survey scams
An ongoing spam campaign characterized by brief subject lines and containing only a hyperlink rendered in a large font saying “Click here to see the attached …
Flashback botnet decline not as fast as expected
Given the attention that the Flashback Mac malware has received since the discovery of the 600K strong botnet of computers infected with it and the number of tools that …