Please turn on your JavaScript for this page to function normally.
New techniques for detecting hardware Trojans

Most Internet users know about the existence of software Trojans, but that of hardware ones is less known. They consist of integrated circuits that have been modified by …

Cybercriminals exploiting user inexperience

Noteworthy threats in October 2011 included the return of a rogue web browser, a phony hacking tool for Gmail account password recovery and malware disguised as advertisements …

Norman releases endpoint protection system

Norman released Endpoint Protection 9, which stops all kinds of malware threats including viruses, worms, trojans, spyware, adware, bots, zero-day threats and rootkits. …

Bitdefender prevents scams on Twitter

Bitdefender is adding a tool to its arsenal to prevent scams on Twitter. Safego has emerged successful from beta testing by Twitter users and will be incorporated into …

Fake Kaspersky AV solution offered via spam emails

Rogue AV software mimicking popular legitimate AV solutions is occasionally offered by cyber crooks in the hopes that the familiar name and look will entice users into buying …

Protection against Duqu malware

A new vulnerability in Windows has been recently identified and is already exploited in the wild. For now, only a handful of targeted attacks have been found. The …

Unknown malware rampant in enterprise networks

New research from Palo Alto Networks shows that targeted and unknown malware are a reality in enterprise networks today, finding hundreds of unique, previously-unknown malware …

iOS flaw allows App Store apps download malicious code

Since the App Store’s inception, Apple has been carefully examining applications submitted by third-party developers in order to assure its customers a malware-free …

One in nine Internet users surfing without protection

The number of new malware strains continues to rise. G Data Security Labs counted over 1.2 million new computer malware strains in the first half of the year alone. Despite …

Hybrid social engineering attacks

Fraudulent phone calls are increasing in popularity. One possible use for these bogus “bank’ calls is to utilize personal identification information stolen using …

Why do malicious Android apps come from China?

It seems like every time we hear about a malicious application aimed at Android users, it is always distributed by third-party Chinese app markets. You might wonder why the …

Browser bloat and privacy concerns

An increase in browser-based bloat and malware, and growing concern over online tracking technology, will top the technology trends in 2012, according to SlimWare Utilities. …

Don't miss

Cybersecurity news