Please turn on your JavaScript for this page to function normally.
Recycled cybercrime tactics adapted to conceal fraud

GFI Software released its VIPRE Report for December 2011, a collection of the most prevalent threat detections encountered during the month. Phishing campaigns once again …

Cyber crooks combine new Zeus variant and DDoS attacks

A new variant of the information-stealing Zeus Trojan – dubbed Gameover – is currently being delivered to unsuspecting victims via emails purportedly coming from …

DotA 2 and Diablo III beta testing crack files carry malware

Gamers are known for their impatience when it comes to trying out updates and new packs for popular games, and cyber crooks are always ready to take advantage of that. …

Ramnit worm goes social, steals Facebook passwords

Ramnit – the file-infecting, financial-data-stealing worm that has been around since April 2010 – has been modified again and is now bent on stealing Facebook …

SpyEye Trojan post transaction fraud schemes attack banks

Many of us tend to spend a little more than we intend during the holiday season and, with all the transactions hitting our accounts, it can be hard to keep track. During the …

Spyware pushed via Google ads

Not every ad you are served by Google is good for you, warns Zscaler’s Julien Sobrier, as he spotted a suspicious looking ad for a free Flash Video player in his Google …

Defensive search-and-destroy “virus” delivered to Japanese government

It took three years and 178.5 million yen (around $2.3 m) to develop a defensive cyber weapon that can track down the sources of cyber attacks and disable them, but Fujitsu …

Stuxnet and Duqu created on same platform, say researchers

Stuxnet and Duqu have made quite an impact on the security community when they were discovered, and are still considered to be two of the most sophisticated pieces of malware …

Fake Amazon smartphone shipping confirmation leads to malware

The gift-giving holidays are almost over, but shopping online is an all-year-round activity for many users and they are often warned to be careful when indulging in it. …

Beware of password-protected documents carrying malware

Password-protected malicious attachments delivered via email are not a new occurrence – we have recently witnesses the tactic being used in the so-called Nitro attacks. …

Data-stealing Android Trojan masquerades as greeting-sending app

Text messages have largely replaced seasonal (and non) greeting cards, and there are mobile apps out there that let you send prewritten witty/sweet messages to friends and …

Analysis of Facebook attacks

Commtouch published a comprehensive analysis of scores of malicious Facebook activities during the past year. Affiliate marketing sites are the final destination in …

Don't miss

Cybersecurity news