Norman antimalware appliance built on Linux platform
Norman announced the latest version of its Network Protection (NNP) antimalware appliance, which improves protection against persistent IT infrastructure security attacks. New …
SpyEye Trojan country hit list
The number of financial institutions targeted by the SpyEye Trojan is growing, according to Trusteer. Risk analysis teams have also observed an increase in the number of …
SecurID users targeted by fake NSA email
RSA’s SecurID token users have recently been targeted with fake emails supposedly coming from the US National Security Agency urging them to update their token code …
Japanese man arrested for storing malware
38-year-old Yasuhiro Kawaguchi is the first person in Japan to get arrested for storing malware on his computer after the upper house’s Judicial Affairs Committee has …
Malware analysis platform
Norman launched the Norman Malware Analyzer G2 platform, which elivers the benefits of traditional sandbox analysis while also offering new IntelliVM capability which embeds …
Chameleon-like fake AV delivered via clever social engineering
A very complex and likely very efficient fake AV spreading campaign has been spotted targeting Facebook users. It starts with users being apparently contacted by one of their …
Mikko Hypponen: Fighting viruses, defending the net
It’s been 25 years since the first PC virus (Brain A) hit the net, and what was once an annoyance has become a sophisticated tool for crime and espionage. Computer …
DDoS bot masquerades as Java update
An especially virulent Trojan variant with DDoS capabilities has been spotted masquerading as a regular Java update and is being served both from legitimate and malicious …
Google warns users about active malware infection
Google has begun notifying its users that a particular piece of malware is installed on their computers by showing a big yellow notification above their search results (click …
Android malware trends
Could it be that 2011 is the year when the long-standing predictions about the rise of mobile malware come true? Symantec’s Irfan Asrar thinks that there are definite …
U.S. military contractors targeted with malicious PDFs
The last few months have seen a lot of cyber attacks aimed at U.S. military contractors and they are still ongoing. F-Secure researchers have recently spotted an email …
Fake financial statements and postal documents lead to fake AV
Fake emails purportedly coming from financial institutions and the post are currently hitting inboxes and are carrying a malicious .exe file disguised as a Word document. …
Featured news
Resources
Don't miss
- Exploits for unauthenticated FortiWeb RCE are public, so patch quickly! (CVE-2025-25257)
- FAPI 2.0: How the OpenID Foundation is enabling scalable interoperability in global healthcare
- pqcscan: Open-source post-quantum cryptography scanner
- Bitdefender PHASR: Proactive hardening demo overview
- Critical Wing FTP Server vulnerability exploited in the wild (CVE-2025-47812)