Please turn on your JavaScript for this page to function normally.
Huge threats still targeting power grids

One year ago, the Stuxnet virus had just been discovered. A year’s worth of analysis still has not unlocked its secrets but it has had a profound influence upon the …

Symantec tackles malicious advertising

Symantec announced AdVantage, a new cloud-based service that will enable website owners to discover malware hidden in online advertisements. Malicious advertising …

How the German “Federal Trojan” was actually used

After the Chaos Computer Club hackers made public the results of their analysis of a few samples of the so-called “Federal Trojan” and found it capable of more …

Trojanized Netflix app steals account login credentials

When Netflix released an Android client app earlier this year, it also witnessed the attempts of various app developers who tried to make a pirated copy of it work on other …

Enhanced automated malware analysis by RSA

RSA announced new capabilities for RSA NetWitness Spectrum, an analytical workbench for the identification, analysis and prioritization of malware-based threats to enterprise …

Fake virus warning from company IT department brings real malware

Emails purportedly coming from a company’s IT department has been spotted targeting users of various big companies and trying to make them download malware for the last …

Don’t worry about zero-days, says Microsoft

Microsoft released its Security Intelligence Report volume 11 (SIRv11), which found that less than 1 percent of exploits in the first half of 2011 were against zero-day …

Best practices for reporting malware

Nonprofit anti-malware organization StopBadware released of its new Best Practices for Reporting Badware URLs, which prescribe specific steps for reporting different types of …

U.S. military drones hit by computer virus

An unnamed virus with a “keylogger” payload has been found in the computers used to operate U.S. Air Force’s Predator and Reaper remotely operated drones. …

Virus Bulletin news tweets spread malware

Malware peddlers are known for using news of unfolding events as lures to trick curious users into clicking on an offered malicious link. This practice is most often seen on …

Government telecommunication-spying malware opens backdoor

The Chaos Computer Club claims that a government-made “lawful interception” Trojan has abilities that exceed those allowed by the nation’s legislature and …

Malware attacks up due to social media

63 percent of more than 4,000 respondents in a new Ponemon Institute survey said that social media in the workplace represents a serious security risk — yet only 29 percent …

Don't miss

Cybersecurity news