12 new malware strains discovered each minute
G DATA researchers discovered a 64.8 percent spike of new malware strains as compared to the first half of 2014. This averages out to 12 new strains per minute. In all, the …
Tech support scammers start targeting users of Apple devices
With the rise of popularity and the widespread ubiquity of devices made by Apple, it was only a matter of time when tech support scammers would begin targeting that ever …
Malicious Google Chrome clone eFast serves ads, collects info
A Google Chrome lookalike browser dubbed eFast is being actively pushed onto users. The software is at best annoying and unwanted, and at worst can lead users to …
Attackers take over org’s OWA server, harvest domain credentials with malicious DLL
Researchers from cyber attack detection and response outfit Cybereason have discovered a novel APT technique that was used by attackers to gain persistence in an (unnamed) …
Scammers use Google AdWords, fake Windows BSOD to steal money from users
Faced with the infamous Windows Blue Screen of Death (BSOD), many unexperienced computer users’ first reaction is panic. If that screen contains a toll free number …
Chinese fraudsters are hijacking and misusing Uber accounts
Uber accounts continue to be hijacked, this time by Chinese fraudsters. According to Motherboard, a number of users complained recently on Twitter that their accounts have …
Scandinavian users hit with fake post office emails, ransomware
“Scandinavian PC users are the latest group to be targeted with Cryptolocker ransomware. According to Heimdal Security, the threat comes via email. The malware peddlers …
Malware takes screenshots of the infected players virtual poker hand
“Malicious spyware is targeting users of Full Tilt Poker and PokerStars online games, ESET researchers have revealed. The spyware, named Odlanor, takes screenshots of …
Android ransomware masquerades as Adult Player app, takes photo of victim
“A new mobile ransomware variant uses a clever new technique to push affected users to pay the asked-for ransom: it takes a photo of the user with the phone’s …
Fake recruiters on LinkedIn are targeting infosec pros
“There’s a group of fake recruiters on LinkedIn mapping infosec people’s networks. Not sure what their goal is yet, just a heads-up to others,” …
Persistent cyber spies try to impersonate security researchers
Rocket Kitten, a cyber espionage group that mostly targets individuals in the Middle East, has been spotted attempting to impersonate security researchers.The group’s …
Adware installer gives itself permission to access Mac users’ keychain
“Malwarebytes researcher Adam Thomas has made an interesting discovery: an adware installer created by Genieo, a well-known distributor of unwanted software, is taking …
Featured news
Sponsored
Don't miss
- Black Friday shoppers targeted with thousands of fraudulent online stores
- RomCom hackers chained Firefox and Windows zero-days to deliver backdoor
- How to recognize employment fraud before it becomes a security issue
- Practical strategies to build an inclusive culture in cybersecurity
- Domain security posture of Forbes Global 2000 companies