Please turn on your JavaScript for this page to function normally.
Millions of infected Android apps… or not?

Over the weekend, several websites picked up Symantec’s story about Trojanized apps on the official Android Market. This happens from time to time, but what got …

Malware redirects bank phone calls to attackers

Trusteer have discovered a concerning development in some new Ice IX configurations that are targeting online banking customers in the UK and US. Ice IX is a modified variant …

Detecting the DNS Changer malware

January marked half-time for the folks at the DNS Changer Working Group (DCWG) who are now running the DNS servers originally used in the Rove botnet. Ever since a …

Defense companies persistently targeted by cyber spies

Researchers from security companies Zscaler and Seculert have issued a warning about bogus emails targeting employees of defense-related organizations around the world in …

Counterclank: Info-stealing Trojan or advertising tool?

A couple of days ago, Symantec has warned about Counterclank, an Android Trojan that has been unknowingly installed by users on over five million devices. This huge number was …

Compromised WordPress sites lead to Phoenix exploit kit

Several hundred compromised websites that at first glance don’t appear to be malicious have been discovered by M86 researchers. The websites – mostly blogs and …

Students used keyloggers on school computers, changed grades

Three Californian 16-year-olds have been arrested for having allegedly broken into their high school, stolen keys and tests, installed keyloggers onto teachers’ …

Bogus “browser update” pages deliver malware

Fake “browser update” pages are currently being used to deliver malware and redirect users to survey pages, warns GFI. Their malware researchers have recently …

Perplexing malware served on social welfare site

Legitimate compromised sites usually serve malware that directly or indirectly makes money for its peddlers, but ever now and then an exception to that rule arises. …

Unwanted apps on Android smartphones

Third-party Android markets have always been the favorite means of malicious app dissemination, especially in regions like Asia, where users don’t have access to the …

A peek into the Sykipot campaigns

The group(s) behind the massive and consistent campaigns targeting US defense contractors with the Sykipot Trojan continue their attacks unabated, reports Symantec. Its …

Malicious MIDI files lead to rootkit malware

A Windows Media remote code execution flaw that has been patched in the last Patch Tuesday is being exploited by attackers in the wild to deliver malware to the targets’ …

Don't miss

Cybersecurity news