Please turn on your JavaScript for this page to function normally.
Improved SpyEye variant actively attacking Android devices

The first SpyEye variant, called SPITMO, has been spotted attacking Android devices in the wild. According to Amit Klein, Trusteer’s chief technology officer, the threat …

NBC News Twitter account hijacked by using a Trojan?

On the very eve of the tenth anniversary of the September 11 attacks, the NBC News Twitter account begun posting messages saying that two civilian airplanes have been hijacked …

Cybercriminals impersonating government agencies

GFI Software today announced its top 10 most prevalent threat detections for August 2011. Notable threats last month included spam and poisoned search engine results targeting …

New financial malware attacks global financial institutions

Trusteer warned that a second non-financial malware variant called Shylock has been retrofitted with fraud capabilities and is abusing its large installed base of infected …

New Zeus-based variant targets banks around the world

Another Zeus-based offering has been unearthed by Trend Micros researchers, and by the look of things, this one seems to be better crafted than the recently discovered Ice IX …

Cyber crooks misusing audit tool to breach VoIP servers

Every now and then, cyber criminals misuse “good” software in order to do bad things, and the latest instance of this modus operandi has been spotted by NSS Labs …

Linux source code repository compromised

The Kernel.org website – home to the Linux project and the primary repository for the Linux kernel source code – sports a warning notifying its users of a security …

Fake Facebook friend request, now with hidden iFrame

A slight variation of last week’s Facebook friend request spam email campaign has been spotted targeting the social network’s users, and this one employs a …

Illegal keygen for well-known AV solution leads to infection

An illegal key generator for the recently released latest version of the TrustPort Internet Security solution brings big trouble to unsuspecting users, warns BitDefender. …

Zeus rival boasts of eluding tracker services, fails

Kaspersky Lab expert Jorge Mieres wrote yesterday about Ice IX – the first crimeware based on the leaked Zeus source code. “Ice IX Botnet is the first new …

Bogus emails delivering scanned documents carry malware

Emails posing as scanned documents sent from a Xerox WorkCentre Pro photocopier are again being sent out by malware peddlers, warns Sophos. This is not the first time that …

Install one Trojan, get three more

Downloader Trojans are often used by cyber crooks to thoroughly infect systems in order to extract anything that might be of value to them. Trojan.Badlib is a particularly …

Don't miss

Cybersecurity news