Recycled cybercrime tactics adapted to conceal fraud
GFI Software released its VIPRE Report for December 2011, a collection of the most prevalent threat detections encountered during the month. Phishing campaigns once again …
Cyber crooks combine new Zeus variant and DDoS attacks
A new variant of the information-stealing Zeus Trojan – dubbed Gameover – is currently being delivered to unsuspecting victims via emails purportedly coming from …
DotA 2 and Diablo III beta testing crack files carry malware
Gamers are known for their impatience when it comes to trying out updates and new packs for popular games, and cyber crooks are always ready to take advantage of that. …
Ramnit worm goes social, steals Facebook passwords
Ramnit – the file-infecting, financial-data-stealing worm that has been around since April 2010 – has been modified again and is now bent on stealing Facebook …
SpyEye Trojan post transaction fraud schemes attack banks
Many of us tend to spend a little more than we intend during the holiday season and, with all the transactions hitting our accounts, it can be hard to keep track. During the …
Spyware pushed via Google ads
Not every ad you are served by Google is good for you, warns Zscaler’s Julien Sobrier, as he spotted a suspicious looking ad for a free Flash Video player in his Google …
Defensive search-and-destroy “virus” delivered to Japanese government
It took three years and 178.5 million yen (around $2.3 m) to develop a defensive cyber weapon that can track down the sources of cyber attacks and disable them, but Fujitsu …
Stuxnet and Duqu created on same platform, say researchers
Stuxnet and Duqu have made quite an impact on the security community when they were discovered, and are still considered to be two of the most sophisticated pieces of malware …
Fake Amazon smartphone shipping confirmation leads to malware
The gift-giving holidays are almost over, but shopping online is an all-year-round activity for many users and they are often warned to be careful when indulging in it. …
Beware of password-protected documents carrying malware
Password-protected malicious attachments delivered via email are not a new occurrence – we have recently witnesses the tactic being used in the so-called Nitro attacks. …
Data-stealing Android Trojan masquerades as greeting-sending app
Text messages have largely replaced seasonal (and non) greeting cards, and there are mobile apps out there that let you send prewritten witty/sweet messages to friends and …
Analysis of Facebook attacks
Commtouch published a comprehensive analysis of scores of malicious Facebook activities during the past year. Affiliate marketing sites are the final destination in …