![Fire](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195511/fire-match-400x200.jpg)
The rise of polymorphic malware
97% of malware is unique to a specific endpoint, rendering signature-based security virtually useless. The data collected by Webroot throughout 2015 shows that today’s threats …
![Lock keyboard](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09114034/keyboard-1-400x200.jpg)
Crypto ransomware hits German hospitals
At least three hospitals in the German state of North Rhine-Westphalia have been hit with crypto ransomware. One is Lukas Krankenhaus (Lukas Hospital) in Neuss, the second one …
![Porn clicker](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09114048/pornclicker-400x200.jpg)
Porn Clicker Android malware hits Google Play hard
In a little over seven months, cybercriminals using click-jacking mobile malware to earn affiliate income have managed to push over 340 instances of the malware into Google …
German police allowed to use its own “federal Trojan”
The German Interior Ministry has approved for investigative use a spying Trojan developed by the German Federal Criminal Police (a so-called “federal Trojan”). In …
![code](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194237/code-400x200.jpg)
Source code of “game changer” Android banking malware leaked online
If you ask users and malware analysts, the Android threat landscape is wide enough, but unfortunately it’s likely to get even wider as source code for the GM Bot banking …
![Android](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194536/android-400x200.jpg)
Mobile banking Trojan bypasses Google Play security
The Acecard malware is capable of attacking users of nearly 50 different online financial applications and services and is able to bypass Google Play store security measures, …
![ZergHelper](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194250/ZergHelper-interfaces-400x200.jpg)
Pirated App Store client for iOS found on Apple’s App Store
An app called 开心日常英语 (“Happy Daily English”), which has been offered for download via Apple’s official App Store, has been revealed to be a fully functional …
![Linux Mint](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194253/linux-mint-400x200.jpg)
Linux Mint hack: Backdoored ISOs, stolen forums database
The web properties of the project developing Linux Mint have been compromised, and the attacker managed to put up a backdoored version of the distro for download for a little …
![Android Marshmallow](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09194956/android-marshmallow-400x200.jpg)
3-in-1 Android malware acts as ransomware, banking Trojan and infostealer
Why stop at asking ransom for encrypted files when you can also steal personal info, passwords, online banking credentials and credit card details, and then sell it or use it …
![ransomware livechat](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194326/ransomware-livechat-400x200.jpg)
Ransomware offers customer support via chat
PadCrypt, a newly discovered piece of ransomware, offers the victims the possibility to chat with the criminals behind the scheme. This ransomware, as many before it, presents …
![Bitcoin](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195645/Bitcoin-400x200.jpg)
Hollywood hospital pays ransom to get their computers, files back
The Hollywood hospital whose systems have been infected with ransomware has paid $17,000 to get the decryption key from the criminals, and is operating normally once again. …
![money](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194554/money-400x200.jpg)
Fighting malware monetization and application vulnerabilities
As the traditional network perimeter disappears and attack surfaces grow, security professionals are challenged with protecting users, applications and data – without …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?