Please turn on your JavaScript for this page to function normally.
Android graffiti
Ghost Push Trojan still a major threat to most Android users

The Ghost Push Trojan (also known as Shedun) is still a considerable threat to Android users around the world. The malware is focused on displaying ads, promoting webpages and …

Send selfies ID cards
Android banking Trojan asks victims to send selfies with ID cards

The Acecard Android Trojan is a threat that has been around for quite some time. Its main goal is to collect login credentials used by the victims to access their online …

Europol
13 countries join global ransomware fight

Just three months after the successful launch of the No More Ransom project, law enforcement agencies from a further 13 countries have signed up to fight ransomware together …

Sierra Wireless
Mirai malware is infecting Sierra Wireless cellular network equipment

AirLink cellular gateway devices by Sierra Wireless are being infected by the infamous Mirai malware. Sierra Airlink models LS300, GX400, GX/ES440, GX/ES450, and RV50 are …

skull
How to implement an EFSS ransomware recovery plan

Ransomware attacks are at an all-time high, and security experts warn it has become a matter of “when” not “if” your company will be breached. The number of victims has grown …

bomb
6000+ compromised online shops – and counting

A week ago, RiskIQ researchers revealed that over 100 online shops have, at one point in the last six months, been injected with malicious JavaScript code that exfiltrates …

email
WSF attachments are the latest malware delivery vehicle

Most users have by now learned not to open executable (.EXE), various MS Office, RTF and PDF files delivered via unsolicited emails, but malware peddlers are always trying out …

biohazard
Most businesses don’t inspect cloud services for malware

The growing use of cloud services and the lack of visibility into sensitive information in the cloud can result in more damaging or costly data breaches, according to the …

mechanics
Deception mechanisms for detecting sophisticated attacks

Private information stored in document files is the most popular target for attacks coming from professional hackers, according to TopSpin Security. File traps, including …

OverSight
OverSight detects when Mac malware uses built-in camera, mic

Users who want to be warned each time their Mac’s camera and microphone are switched on – either by a legitimate process or, more importantly, by malware – …

Polyglot ransomware decryption tool released

Kaspersky Lab experts have released a Polyglot ransomware decryption tool, which enables users who have suffered from this ransomware, also known as MarsJoke, to restore their …

Android malware
DressCode Android malware found in 3,000 apps

When Check Point researchers unearthed more than 40 apps on Google Play (and 400 on third party app stores) infected with the so-called DressCode malware in late October, it …

Don't miss

Cybersecurity news