Please turn on your JavaScript for this page to function normally.
Combating Halloween malware threats

GFI Software released tips for spotting and combating malware attacks and threats in the run up to Halloween. Halloween has now become firmly established as a family event in …

Android malware is stealing your data

The second half of 2011 has been an active one for cyber criminals, who have been increasingly looking for chances to set up new scams in the mobile device environment. …

Fake DHL delivery notification carries info-stealer Trojan

Malware peddlers have once again started a spam run that consists of emails purportedly sent by DHL. They spoofed the sender information, making it look like the email was …

Naked Emma Watson video leads to malware

Fake videos or pictures of naked international celebrities are often used as lures in schemes to propagate malware. The latest of these videos purportedly features popular …

Tsunami, a new backdoor for Mac OS X

Malware authors have taken an old piece of malware developed for Linux and have modified it to attack the Mac OS X platform, warns ESET. The OS X malware has been named …

Japanese Parliament’s computers infected, data stolen

As the investigation into the breach of Mitsubishi Heavy Industries’ networks discovered last month continues, internal sources have confirmed that sensitive and …

Duqu: Another “most advanced” piece of malware

Rootkit.Duqu.A is the current star in the world of malware but, as history shows, that fame will be short-lived. Just like fashion models, modern malware has a lifespan in the …

Bloody photos of Gaddafi used as bait in malware-laden email run

As predicted, the violent death of Libyan dictator Moammar Gaddafi has been taken advantage of by cyber criminals in order to trick gore-hungry users into downloading malware: …

Which mobile OS is most hit by malware?

As most mobile phone users still don’t have a mobile AV solution installed on their devices, it can be rather hard to gauge just how many of them have been hit by mobile …

Federal Trojan has more capabilities than previously thought

Ten days ago, the Chaos Computer Club made public a set of worrisome discoveries made by their analysis of the “lawful interception” Trojan used by German law …

Mac Trojan disrupts automatic updating of XProtect

A variant of the recently discovered Flashback Trojan for Mac OS X has acquired the capability to disrupt the automatic updating of XProtect, the operating system’s …

Duqu: The next tale in the Stuxnet files

Stuxnet was possibly the most complex attack of this decade, and we expected that similar attacks would appear in the near future. One thing for sure is that the Stuxnet team …

Don't miss

Cybersecurity news