Cybercriminals shifting focus to non-Windows systems
In a major cybercrime turning point, scammers have begun shifting their focus away from Windows-based PCs to other operating systems and platforms, including smart phones, …
Zeus malware now targets online payment providers
The Zeus malware continues to evolve, diversifying away from its target bank sites and their customers, and over to sites with user credentials that allow assets that have a …
Fake Facebook password change notification leads to malware
The following e-mail purportedly sent by Facebook has recently been hitting inboxes around the world: The attached .zip file that supposedly contains the new password actually …
A global shift in cybercrime
The target of attacks has shifted from traditional infrastructure to mobile users and endpoint devices, according to a new report. Research from SpiderLabs found that …
Chinese Trojan targets cloud-based AV technologies
A Trojan that tries to obstruct cloud-based antivirus technology present in major AV solutions offered by Chinese security firms is targeting users by posing as a video player …
“Free iPhone and iPad combo” offer lures Twitterers to malicious site
A surge in malicious shortened links accompanying messages that say I just won a free iphone and ipad! (or a variation of that message) has been spotted on yesterday morning …
Bizarre Firefox update scam offers AV to go with it
A fascinating mishmash of scammy offers is currently being pushed onto Russian-speaking users on chatrooms, forums and security lists. It all starts with a link that takes …
Dramatic increase in malware and phishing via social networks
By mid-2010, Facebook recorded half a billion active users, making it not only the largest social networking site, but also one of the most popular destinations on the web. …
ICQ’s critical flaw allows attackers to serve malicious software update
ICQ – the popular instant messaging application – has a gaping security hole that can allow attackers to execute malicious code on the targeted system, says …
Vulnerabilities in the Boonana Trojan increase the danger
First spotted almost three months ago, the Boonana Trojan stood out because of its capability to infect both computer running Windows and those running Mac OS X. The Trojan …
Banking Trojan incorporates legitimate remote control software
It seems that every technology made for “good” can be misused, and that also goes for software, apparently. An ESET researcher has recently received a sample of …
Toolkit merging Zeus and SpyEye already on the market?
When the alleged Zeus-SpyEye merger became news last October, a lot of people wondered what new capabilities we could expect of this new toolkit. According to McAfee’s …
Featured news
Resources
Don't miss
- Google open-sources privacy tech for age verification
- You can’t trust AI chatbots not to serve you phishing pages, malicious downloads, or bad code
- Cisco fixes maximum-severity flaw in enterprise unified comms platform (CVE-2025-20309)
- GitPhish: Open-source GitHub device code flow security assessment tool
- Healthcare CISOs must secure more than what’s regulated