Computer and biological viruses might eventually converge
The term “computer virus” was coined by Fred Cohen in the early 1980s, because like its biological counterparts, the computer virus is essentially a sequence of …
Beware of fake Google AV
Cyber crooks are once again trying to take advantage of Google’s name and logo to push malware onto unsuspecting users. According to GFI researchers, a number of pages …
The practice of insecure collaboration
Most often sensitive information exchanged beyond the firewall with business partners and customers is still primarily conducted through email and consumer-grade file sharing …
Europeans targeted with new ransomware
In the last couple of years, malware that hijacks the users’ machines and demands money to “unblock” it has become an often encountered threat. Messages …
Fake LinkedIn emails serve malware
Emails purportedly coming from business-related social network LinkedIn have been hitting inboxes in the last couple of days, ostensibly reminding recipients of invitations …
Fake Google Play site serves Android malware
Online scammers are known for their adaptability, so it should not come as a surprise that the recent name change of Google’s official Android Market – now dubbed …
Most notorious Android malware
Total Defense announced the findings of its 2011 Internet Security Threat Intelligence Report, which indicates Android’s rise in market share was only surpassed by the …
Profile Analyzer: Protect websites from cyber attacks
Silver Tail Systems announced Profile Analyzer, which provides real-time analysis of both individual user behavior and crowd behavior on websites to identify malicious …
Malware sophistication worries IT leaders
More than half of IT leaders (62 percent) fear that malware is growing more sophisticated faster than they can upgrade their analysis capabilities. Additionally, 58 percent …
Fake online streaming service phishes and robs users
With high-speed Internet being now a common enough thing in many parts of the world, many users have taken to watching films and videos via online streaming. Unfortunately, …
China escalating Tibetan cold war into cyberspace
AlienVault has discovered a range of spear phishing attacks taking place against a number of Tibetan organizations, apparently from Chinese attackers. The attacks signal a …
New online banking fraud schemes target mobile users
Trusteer uncovered two online banking fraud schemes designed to defeat one time password (OTP) authorization systems used by many banks. Unlike a previous attack Trusteer …