Significant drop in FakeAV
The trend in malicious software and attempted cyber crime is up but some of the most popular and visible malware is trending down. According to lab results from Norman, a …
New mobile security challenges
For years, analysts have predicted most Internet users would end up with an all-in-one device that replaces all others. However, as new devices emerge, users are often …
Phishers prefer real money to virtual funds
October was rich in sensational events which, as usual, the spammers exploited to the full, says Kaspersky Lab. Mass mailings were registered that referred to the death of …
Fake iTunes gift certificate offer carries malware
As the holiday shopping season is poised to start in the U.S. with tomorrow’s Black Friday, users are advised to be extra careful when it comes to too-good-to-be-true …
Android officially the primary target for new mobile malware
The Android mobile operating system solidified its lead as the primary target for new mobile malware, according to McAfee. The amount of malware targeted at Android devices …
Yet another Trojan based on Spitmo source code surfaces
Even though nearly all new mobile malware in Q3 was aimed at Android phones, users with mobile devices running other mobile platforms are far from safe. F-Secure researchers …
Backdoor Trojan pushed via versatile Facebook campaign
Thanks to its social nature, Facebook is one of the preferred tools of cyber crooks looking to scam users and peddle malware. Microsoft recently spotted a considerably …
DevilRobber Trojan returns, masquerades as PixelMator
DevilRobber, the latest Trojan to target Mac users, got updated. As you may remember, the previous incarnation stole Bitcoins from the user’s wallet file, used the …
Teach children about online protection
In an effort to facilitate effective parent-child dialogue about Internet dangers, Trend Micro developed an eGuide with tips to help families have “The Talk” about …
Forensics for advanced threat activity
Damballa announced Failsafe 5.0, a solution that hunts for undetected threats by correlating a variety of observed network behaviors that indicate malware-infected devices …
Trojan masquerading as PDF signed with stolen government certificate
Since the discovery of the Stuxnet worm, and especially after the recent string of certification authority compromises, cyber attackers’ practice of using digital …
Block cipher encryption effectively hides banking Trojan
Brazilian malware peddlers have turned to encrypting banking Trojans with block ciphers, effectively bypassing most AV software. Kaspersky Lab’s Dmitry Bestuzhev says …