Cybercriminals impersonating government agencies
GFI Software today announced its top 10 most prevalent threat detections for August 2011. Notable threats last month included spam and poisoned search engine results targeting …
Mobile malware criminal command-and-control activity
Criminal operators continue to hone their craft in 2011 using crimeware that can be repurposed for multiple fraud opportunities, sold or leased to other criminals, and that is …
New financial malware attacks global financial institutions
Trusteer warned that a second non-financial malware variant called Shylock has been retrofitted with fraud capabilities and is abusing its large installed base of infected …
Web Directories site leads to exploit kit and malware
Web Directories, a site designed to help webmasters and site owners find relevant directories, has been compromised and found redirecting its visitors to sites running the …
New Zeus-based variant targets banks around the world
Another Zeus-based offering has been unearthed by Trend Micros researchers, and by the look of things, this one seems to be better crafted than the recently discovered Ice IX …
Morto worm surprises again
As it turns out, the recently discovered Morto worm that has been spreading in the wild has more than one never-before-seen characteristic. Not only does it spread by using …
Blackhat SEO spam is a global problem
If you have wondered whether to switch your go-to search engine for another – perhaps more localized? – in order to avoid the seemingly ubiquitous poisoned search …
U.S. cities most vulnerable to online threats
Who is most at risk of fraudulent credit card charges, stolen identities, email security breaches or lost personal data? An AVG survey of online and mobile consumer behaviors …
AVG Internet Security 2012 released
AVG announced the availability of AVG Internet Security 2012, the latest edition of its internet security software. In addition to AVG’s multi-layered protection, …
Malicious infections enter 99% of enterprise networks
There is a significant gap in today’s enterprise IT defenses, as advanced malware and targeted attacks are easily evading traditional defenses, such as firewalls, …
2011: Year of the hack
In a year that IT security experts have labeled the “Year of the Hack,” Bit9’s endpoint survey of 765 IT executives revealed that Advanced Persistent Threat …
Morto worm spreads via RDP, brute-forces Administrator accounts
There’s a new worm in town and it’s the first one that spreads by taking advantage of the Remote Desktop Protocol (RDP). “Once a machine gets infected, the …