Emerging threats: Attacks via MIPS devices
First of all, if something has already been invented and has been seen in-the-wild more than once, it’s very likely to occur again and again, especially if the attacks …
Keeping abreast of Web malware delivery techniques
One of the crucial things that Google must do to keep making Internet users use its search engine is to keep an eye on the many ways that cyber criminals employ to spread …
“Uniform traffic ticket” spam leads to malware
A massive spam campaign taking the form of an email notifying the recipients of a bogus traffic ticket has been detected by a number of security companies. The email in …
RSA proactively blocks malware threats
RSA announced updates to its CyberCrime Intelligence Service designed to help enterprises monitor and harden their infrastructure against malware infection and data loss. This …
PoC keylogger app for smartphones revealed
We are all familiar with keyloggers – software that registers and identifies the keys pressed by a computer user – and its prevalently malicious uses. One of the …
SpyEye source code and crack for the toolkit leaked
Three months after Zeus’ source code has been spotted being sold for small amounts on underground online markets, Xyliton – a French security researcher and member …
IE 9 best option against Web-based malware attacks
Microsoft’s Internet Explorer 9 has proved once again to be the best choice when it comes to catching attacks aimed at making the user download Web-based malware. This …
500% increase in email-attached malware
The UPS name is once again being used to spread vast amounts of email-attached malware. The last week has seen an extraordinary increase – over 5.5 times the average …
Android malware answers calls, eavesdrops on users
Android users are two-and-a-half times as likely to encounter malware today than just six months ago, say the recently revealed results of an extensive analysis by Lookout. …
Banking Trojan that steals from the rich
To be sure, it steals from the poor, too, but it contains a routine that automatically tries to transfer a rather large amount of money from the victim’s account to …
Fake CCleaner offered for a small fee
Anything and everything you download from the Internet could be a piece of malware, disguised as a legitimate document or software. GFI has recently spotted a Russian website …
Android malware masquerading as love test app
Online Chinese third party app stores are a treasure trove of Android malware which hides under many guises. Their goal is often the same: get permission from the user to send …