How to avoid malware hiding behind QR codes
As the use of QR codes becomes increasingly widespread, users should be aware that they are also becoming an easy way for malware peddlers to spread their malicious wares. …
Biggest security threat for 2012? Privacy violations
Cyber-espionage, along with privacy violations and social networking attacks facilitated by the increased use of mobile and tablet devices, will be the source of increased …
How to spot fake Android apps
In the wake of the news that Google has again been removing Premium SMS fraudulent apps masquerading as popular games from its the official Android Market, TrendMicro’s …
The rise of social media abuse and mobile malware
IID released its list of the top security trends from 2011. Some specific trends that IID saw emerge over the past year include the extended enterprise coming under assault, …
Mobile pickpocketing and botnets will rise
Mobile threats are on the rise — Lookout estimates that mobile threats successfully stole more than one million dollars from Android users in 2011. In 2012, Lookout predicts …
Nitro attackers still at it, mock Symantec
Back at the beginning of November, Symantec researchers made public a report they compiled on a spear phishing campaign carrying a backdoor Trojan that was systematically …
Sykipot Trojan takes advantage of Adobe Reader zero-day flaw
AlienVault Labs researchers have unearthed a piece of malware that takes advantage of the recently discovered zero-day Adobe Reader flaw used for attacking defense …
Premium SMS fraudulent apps target European users
European mobile phone users should be on the lookout for premium SMS toll fraud apps as a great number of them has been lately discovered on file sharing sites, third-party …
2012 network security trends
Looking back on 2011, FortiGuard Labs saw a number of landmark developments in the world of network security. Huge botnets such as DNS Changer and Coreflood were permanently …
Delivering banking Trojan via malicious boot loaders
Brazil is a country whose Internet users are targeted almost exclusively by cyber crooks wielding banking Trojans. It is also a country where a majority of users still runs …
Top security predictions for 2012
As December rolls in and 2012 looms on the IT security horizon, Tufin Technologies – the security lifecycle management specialist – has come up with its top five …
Tips to stay protected online
Now more than ever before, computer users need to take measures to protect themselves online, and choosing the right antivirus software is a key step in defending against …