Please turn on your JavaScript for this page to function normally.
10.8 million Android devices infected with malware

From 2010 to 2011, Android officially overtook Symbian as the most targeted mobile platform in the world by cyber criminals, according to NQ Mobile. In 2011, newer and more …

Bogus “Scan from a HP OfficeJet” notifications lead to malware

Notifications about documents purportedly having been scanned and sent via a HP OfficeJet printer/scanner are targeting users again and trying to trick them into opening the …

Pastry lovers served with ransomware via exploit kit

French cake and pastry lovers have been targeted by cyber crooks as the website of the famous confectionery company Laduree has been compromised and found serving ransomware. …

FCC offers advice to ISPs for boosting network security

The Chairman of the Federal Communications Commission, an independent agency of the US government whose goals include public safety, says that Internet service providers …

Trojan hijacks often-used DLL file for stealthier approach

A new dropper Trojan has been detected by BitDefender researchers, and this one utilizes an interesting technique in order to hide from antivirus software installed on the …

New Zeus/SpyEye makes bots function as C&C servers

The latest build of the Zeus/SpyEye malware shows a change that could very well hamper the security researchers’ ability to take down the botnets using it and to find …

Fake RIAA copyright violation notification serves malware

First spotted nearly a week ago, notifications of copyright violation supposedly sent by the Recording Industry Association of America are still hitting inboxes around the …

Malware surpassed 75 million samples in 2011

McAfee released its latest threats report, revealing that malware surpassed the company’s estimate of 75 million unique malware samples last year. Although the release …

Syrian dissidents claim government uses malware to spy on them

Syrian opposition activists have been targeted by the government since the start of the massive anti-government protests in January 2011, but only recently they have began to …

Trend Micro makes HijackThis open source

Trend Micro released HijackThis as an open source application. The code, originally written in Visual Basic, is now officially available at SourceForge. HijackThis scans your …

Forensic toolkit with malware analysis technology

AccessData released Forensic Toolkit 4 (FTK) that gives organizations affordable access to more advanced incident response and remote investigative capabilities. Using FTK, …

Cutwail botnet intensifies spam spewing

The old Cutwail botnet is still alive and spamming from its 1,5 million bots, and has lately been spotted using malicious HTML attachments. The spam emails vary from fake …

Don't miss

Cybersecurity news