New Zeus variant creates bogus Instagram accounts
If you are familiar with the results of a recently finished study regarding online content popularity that concluded that “likes” beget “likes”, the …
Cyber crooks misuse Google service to control Android Trojans
Cybercriminals have been spotted using a novel method of controlling Android mobile malware: a legitimate service called Google Cloud Messaging. GCM has been created to allow …
Reveton changes tack, relies on fake AV
When it comes to the infamous Reveton ransomware, cyber crooks are forever coming up with additional ways to bilk money from users: pairing it up with banking Trojans, playing …
Linux banking Trojan offered for sale
Windows users are by far the most targeted ones by malware-wielding criminals, but that doesn’t mean that OS X and Linux users should feel impervious. In fact, RSA …
Trojanized Android app collects info, comments on NSA surveillance
An unusual Android Trojan has been recently unearthed by McAfee’s researchers, embedded in a pirated version of a legitimate music app. The app in question is Jay Z …
Fake Pinterest “Password changed” email leads to malware
Pinterest users beware: an email purportedly coming from the popular pinboard-style photo-sharing website and notifying you of a successful password reset is fake: If you …
Litecoin-stealing Trojan found
Bitcoin is the most popular, but not the only crypto currency out there. As interest in and use of other ones rises, malware that tries to steal particular types of currencies …
Citadel Trojan automatically localizes fraud content
Any successful business knows that it cannot rely solely on one market for future growth. Software companies often conduct business in multiple international markets and …
Confirmed: Carberp source code leaked
It has been confirmed: the password-protected ZIP file that is currently sold on a number of underground forum does indeed contain the source code of the infamous Carberp …
Washington Free Beacon website redirects to malware
A “big” story like that regarding NSA spying was bound to be used by cyber crooks as a lure. So far, no emails containing links to booby-trapped pages or malicious …
Researchers find self-propagating Zeus variant
The Zeus / Zbot Trojan has been around since 2007, and it and its variants continued to perform MitM attacks, log keystrokes and grab information entered in online forms. It …
New Android Trojan is complex as Windows malware
Mobile (and especially Android) malware is on the rise and according to researchers from Kaspersky Lab, its complexity is also increasing. Case in point: …
Featured news
Resources
Don't miss
- CISA: Use Signal or other secure communications app
- Another NetWalker affiliate sentenced to 20 years in prison
- Why cybersecurity is critical to energy modernization
- Cryptocurrency hackers stole $2.2 billion from platforms in 2024
- CISA orders federal agencies to secure their Microsoft cloud environments