Why do malicious Android apps come from China?
It seems like every time we hear about a malicious application aimed at Android users, it is always distributed by third-party Chinese app markets. You might wonder why the …
Browser bloat and privacy concerns
An increase in browser-based bloat and malware, and growing concern over online tracking technology, will top the technology trends in 2012, according to SlimWare Utilities. …
GFI Software cloud-based anti-malware and anti-spam email security
GFI Software announced that GFI MailEssentials Complete Online, a cloud-based anti-malware and anti-spam email security solution, is now available to small and medium …
Unique malware URLs increased 89 percent
Websites loaded with malware increased a massive 89 percent in the third quarter compared to Q2 2011. According to an IID report, the most impersonated organizations include …
Five million new malware samples
In the third quarter of 2011 alone, five million new malware samples were created. In addition, Trojans set a record for becoming the preferred category for cybercriminals to …
Fake AV peddlers change their tactics
There has been a decline in rogue AV schemes lately, and researchers chalk it up to a combination of law enforcement and security community efforts and an increased coverage …
Duqu installer exploits zero-day bug in Windows kernel
An installer for the Duqu Trojan has been discovered by CrySys, the Hungarian firm that initially discovered the threat, and the file has shed some light onto how the threat …
Online social networks: Malware launch pads
With the advent of social networks, the online world has become a virtual society. Social networks serve as seamless communication channels, but at the same time they are …
Multitasking DevilRobber Trojan targets Mac OS X users
Another week, another Mac OS X Trojan spotted. Both Sophos and Intego have detected a Bitcoin-mining Trojan that also opens a backdoor into the infected system and steals …
ICSA Labs tests products against larger malware set
ICSA Labs, an independent division of Verizon, is now testing products in its Anti-Virus program against virus samples from not only the WildList (a database of real-world …
Duqu not developed by Stuxnet author
The Dell SecureWorks Counter Threat Unit (CTU) research team has been analyzing the Duqu trojan which received a great deal of attention because it is similar to the infamous …
Cyber crooks migrate to “ce.ms” free domains
Online scammers and malware peddlers often exhibit locust-like behavior as they migrate from one type of free domains to another in order to evade detection by spam filters …
Featured news
Sponsored
Don't miss
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints