Please turn on your JavaScript for this page to function normally.
Data-stealing malware growth spikes

The propagation of some forms of crimeware surged in the half-year period ending in June, 2011 with data-stealing malware reaching and maintaining a new plateau of contagion, …

Android Trojan used for political activism

In the overwhelming majority of cases, mobile Trojans are designed to steal money or information which will ultimately be monetized. But occasionally, there are some out there …

Latest spam campaigns delivering the Zbot Trojan

For a while now, fake messages and warnings from USPS, FedEx and DHL about supposedly undelivered packages have been hitting inboxes, and users have been getting wiser about …

Nitro attackers still at it, mock Symantec

Back at the beginning of November, Symantec researchers made public a report they compiled on a spear phishing campaign carrying a backdoor Trojan that was systematically …

Sykipot Trojan takes advantage of Adobe Reader zero-day flaw

AlienVault Labs researchers have unearthed a piece of malware that takes advantage of the recently discovered zero-day Adobe Reader flaw used for attacking defense …

Delivering banking Trojan via malicious boot loaders

Brazil is a country whose Internet users are targeted almost exclusively by cyber crooks wielding banking Trojans. It is also a country where a majority of users still runs …

Tips to stay protected online

Now more than ever before, computer users need to take measures to protect themselves online, and choosing the right antivirus software is a key step in defending against …

Download.com bundles Nmap with malware

“Hi Folks. I’ve just discovered that C|Net’s Download.Com site has started wrapping their Nmap downloads (as well as other free software like VLC) in a …

Significant drop in FakeAV

The trend in malicious software and attempted cyber crime is up but some of the most popular and visible malware is trending down. According to lab results from Norman, a …

Hungarian hacks into Marriot, tries to land job through blackmail

A Hungarian national who thought that he could blackmail Marriott International into giving him a job by stealing the company’s internal documents and threatening to …

Yet another Trojan based on Spitmo source code surfaces

Even though nearly all new mobile malware in Q3 was aimed at Android phones, users with mobile devices running other mobile platforms are far from safe. F-Secure researchers …

Backdoor Trojan pushed via versatile Facebook campaign

Thanks to its social nature, Facebook is one of the preferred tools of cyber crooks looking to scam users and peddle malware. Microsoft recently spotted a considerably …

Don't miss

Cybersecurity news