Man sentenced to 82 months for malware
A New Hampshire man was sentenced in federal court for his role in an international computer hacking conspiracy and his failure to file income tax returns while living in …
Malware family integration across botnets
Analysis by Symantec reveals that in February, 1 in 290.1 emails (0.345%) was malicious making February among the most prolific time periods both in terms of simultaneous …
Myvue.com and Autotrader.co.uk infected with malvertising
Taking advantage of the fact that a lot of security companies are more relaxed over the weekend, cybercriminals use the opportunity to strike. This weekend, the popular auto …
Attackers take advantage of emerging technologies
Attackers continue to focus on social engineering attacks and circumventing legacy enterprise security systems, according to Zscaler. Q4 saw shifts in the sources of …
Banking MitB Trojan effective with most browsers
Man-in-the-Browser attacks are becoming ever more popular with cybercriminals that seek to plunder bank accounts. The latest in a long string of banking Trojans that aids them …
New backdoor Mac OS X Trojan surfaces
There are many good reasons to choose a Mac machine, and among those is surely the fact that malware for OS X still pops up rarely. As Apple slowly but surely increases its …
Social media authenticity, privacy and security
Panda Security is providing guidance on ways to safely and securely integrate social media strategies into an SMB. Panda Security discovered that 78 percent use social …
Flaw in MS Malware Protection Engine puts users at risk
The latest update to the Microsoft Malware Protection Engine includes a patch for a vulnerability that could allow an elevation of privilege if the Engine performs a scan of …
Fake YouTube pushes out Trojan disguised as plugin
It could happen to anyone. A click on a link posted by a compromised Facebook account or in an e-mail sent from an e-mail account of a friend who got phished, and you’re …
Malware-driven pervasive memory scraping
Reports are coming in of a new trend in hacking techniques. Known as “pervasive memory scraping,’ the technique relies on the fact that certain areas of Windows …
Spyware compromises 150,000+ Symbian devices
A new variant of spyware “Spy.Felxispy” on Symbian devices causing privacy leakage has recently been captured by the National Computer Virus Emergency Response …
A single click can open door to cybercrime
Blue Coat Systems unveiled their 2011 security report that examines Web behavior and the malware to which users are most frequently exposed. The report analyzes Web requests …