Please turn on your JavaScript for this page to function normally.
Trojan masquerading as PDF signed with stolen government certificate

Since the discovery of the Stuxnet worm, and especially after the recent string of certification authority compromises, cyber attackers’ practice of using digital …

Block cipher encryption effectively hides banking Trojan

Brazilian malware peddlers have turned to encrypting banking Trojans with block ciphers, effectively bypassing most AV software. Kaspersky Lab’s Dmitry Bestuzhev says …

New techniques for detecting hardware Trojans

Most Internet users know about the existence of software Trojans, but that of hardware ones is less known. They consist of integrated circuits that have been modified by …

Hybrid social engineering attacks

Fraudulent phone calls are increasing in popularity. One possible use for these bogus “bank’ calls is to utilize personal identification information stolen using …

Five million new malware samples

In the third quarter of 2011 alone, five million new malware samples were created. In addition, Trojans set a record for becoming the preferred category for cybercriminals to …

Cybercriminal gang ringleaders convicted for stealing over $4.5 million

Two Ukrainians who admitted to have been the ringleaders of a criminal ring bent on stealing money from online bank accounts have finally been sentenced to four years and …

Multitasking DevilRobber Trojan targets Mac OS X users

Another week, another Mac OS X Trojan spotted. Both Sophos and Intego have detected a Bitcoin-mining Trojan that also opens a backdoor into the infected system and steals …

Duqu not developed by Stuxnet author

The Dell SecureWorks Counter Threat Unit (CTU) research team has been analyzing the Duqu trojan which received a great deal of attention because it is similar to the infamous …

Fake DHL delivery notification carries info-stealer Trojan

Malware peddlers have once again started a spam run that consists of emails purportedly sent by DHL. They spoofed the sender information, making it look like the email was …

Naked Emma Watson video leads to malware

Fake videos or pictures of naked international celebrities are often used as lures in schemes to propagate malware. The latest of these videos purportedly features popular …

Japanese Parliament’s computers infected, data stolen

As the investigation into the breach of Mitsubishi Heavy Industries’ networks discovered last month continues, internal sources have confirmed that sensitive and …

Federal Trojan has more capabilities than previously thought

Ten days ago, the Chaos Computer Club made public a set of worrisome discoveries made by their analysis of the “lawful interception” Trojan used by German law …

Don't miss

Cybersecurity news