Please turn on your JavaScript for this page to function normally.
SpyEye Trojan post transaction fraud schemes attack banks

Many of us tend to spend a little more than we intend during the holiday season and, with all the transactions hitting our accounts, it can be hard to keep track. During the …

Spyware pushed via Google ads

Not every ad you are served by Google is good for you, warns Zscaler’s Julien Sobrier, as he spotted a suspicious looking ad for a free Flash Video player in his Google …

Defensive search-and-destroy “virus” delivered to Japanese government

It took three years and 178.5 million yen (around $2.3 m) to develop a defensive cyber weapon that can track down the sources of cyber attacks and disable them, but Fujitsu …

Stuxnet and Duqu created on same platform, say researchers

Stuxnet and Duqu have made quite an impact on the security community when they were discovered, and are still considered to be two of the most sophisticated pieces of malware …

Fake Amazon smartphone shipping confirmation leads to malware

The gift-giving holidays are almost over, but shopping online is an all-year-round activity for many users and they are often warned to be careful when indulging in it. …

Beware of password-protected documents carrying malware

Password-protected malicious attachments delivered via email are not a new occurrence – we have recently witnesses the tactic being used in the so-called Nitro attacks. …

Data-stealing Android Trojan masquerades as greeting-sending app

Text messages have largely replaced seasonal (and non) greeting cards, and there are mobile apps out there that let you send prewritten witty/sweet messages to friends and …

Analysis of Facebook attacks

Commtouch published a comprehensive analysis of scores of malicious Facebook activities during the past year. Affiliate marketing sites are the final destination in …

Data-stealing malware growth spikes

The propagation of some forms of crimeware surged in the half-year period ending in June, 2011 with data-stealing malware reaching and maintaining a new plateau of contagion, …

Amazon users targeted with fake shipping notices

The BlackHole exploit kit has become an increasingly popular way of delivering malware to unsuspecting users. By exploiting a series of unpatched Windows, Java and Adobe …

Android Trojan used for political activism

In the overwhelming majority of cases, mobile Trojans are designed to steal money or information which will ultimately be monetized. But occasionally, there are some out there …

Kim Jong-il death spam carries malware

As expected, malicious spam taking advantage of the death of North Korean leader Kim Jong-il has been hitting inboxes since the news was announced. The emails contain a simple …

Don't miss

Cybersecurity news