Apple acknowledges Mac Defender existence, gives removal instructions
It took a while for Apple to react properly to the onslaught of Mac Defender and similar fake AV aimed at Mac users, but they finally did it. Only days after the revelation of …
Fake VirusTotal site serves malware
VirusTotal – the popular free file checking website – has been spoofed by malware peddlers, warns Kaspersky Lab. A simple visit to the site triggers the download …
iPhone 5 spam run leads to malware
The date of the release of iPhone 5 is still unknown, but that doesn’t stop malware peddlers from using it to lure in Apple fanatics. After all, didn’t a recent …
The progress of IT threats in 2010
Cyber criminals have capitalized on the recent growth in popularity of the Android mobile platform. Based on the number of new mobile malware signatures detected during this …
Mac Protector: Fake AV targets Mac OS X users
A little over two weeks have passed since the appearance of MAC Defender, the fake AV solution targeting Mac users. And seeing that the approach had considerable success, it …
SpyEye Trojan attacks Verizon’s online payment page
Trusteer discovered a configuration of the SpyEye Trojan targeting Verizon’s online payment page and attempting to steal payment card information. The attack took place …
New Alureon variant improves on old evasion techniques
The Alureon Trojan (also known as TDL, TDSS and Tidserv) has been around since 2007, and it’s function consist mainly in allowing the attacker to intercept incoming and …
Trojan paves way for rogue defragmenter
You might have heard about rogue AV solutions and scareware, but not many people have experienced a rogue defragmenter that hides files and (indirectly) asks money to return …
Wikipedia-like sites peddling fake pharmaceuticals
Wikipedia is practically a household name now, so it’s no wonder that spammers are trying to take advantage of the online encyclopedia’s popularity and (relative) …
The rise of rogue AV
April saw a continued increase in the volume of detected malware, with 73,000 new variants of threats being released daily – a 26 percent increase over the same period …
Tips for guarding against mobile malware threats
In order to guard against growing mobile malware threats, Juniper Networks offers the tips below. For consumers: Install an on-device anti-malware solution to protect against …
Phishing attacks rise year over year
Phishing attacks in Q1 2011 increased significantly compared to Q1 2010, according to IID. Criminals utilized phishing scams 12 percent more from January to March 2011 than …
Featured news
Resources
Don't miss
- CISA: Use Signal or other secure communications app
- Another NetWalker affiliate sentenced to 20 years in prison
- Why cybersecurity is critical to energy modernization
- Cryptocurrency hackers stole $2.2 billion from platforms in 2024
- CISA orders federal agencies to secure their Microsoft cloud environments