Please turn on your JavaScript for this page to function normally.
Kaspersky PURE 2.0 Total Security released

Kaspersky Lab, a leading developer of secure content and threat management solutions today announced a new version of its flagship product for at-home PC protection – …

Microsoft disrupts massive cybercrime operation

In its most complex effort to disrupt botnets to date, Microsoft, in collaboration with the financial services industry — including the Financial Services – Information …

Flash-based rogue AV targets users

The business of pushing rogue AV software onto unsuspecting users is quite lucrative, so it’s no wonder that cyber crooks are still doing it. But while most of the time …

Megaupload users targeted with extortion scheme

The recent shutdown of the Megaupload file hosting service by the US authorities is being actively exploited by cyber crooks who are attempting to extort money from the …

Georbot information stealing Trojan uncovered

ESET revealed its analysis of Georbot, an information stealing Trojan and botnet spreading in the country of Georgia. Earlier this year ESET’s global research team …

Mousetrap Trojan steals money by chain reaction

Catalin Cosoi, Chief Security Researcher at Bitdefender warns of a new Trojan that robs your bank account. The new Mousetrap campaign starts with a Java applet that has been …

Duqu developers still active, researchers say

Duqu, the infamous remote access Trojan first discovered in November 2011 and thought to have been created by the same authors as Stuxnet, is still getting modified by its …

Carberp gang arrested in Russia

Eight men have been arrested in Moscow for having allegedly stolen over $2 million from the bank accounts of over 90 Russian individuals by infecting their computers with the …

Computer and biological viruses might eventually converge

The term “computer virus” was coined by Fred Cohen in the early 1980s, because like its biological counterparts, the computer virus is essentially a sequence of …

Beware of fake Google AV

Cyber crooks are once again trying to take advantage of Google’s name and logo to push malware onto unsuspecting users. According to GFI researchers, a number of pages …

The practice of insecure collaboration

Most often sensitive information exchanged beyond the firewall with business partners and customers is still primarily conducted through email and consumer-grade file sharing …

Europeans targeted with new ransomware

In the last couple of years, malware that hijacks the users’ machines and demands money to “unblock” it has become an often encountered threat. Messages …

Don't miss

Cybersecurity news