cybercriminals
Bogus LinkedIn invitations lead to info-stealer Trojan
Another round of LinkedIn-themed spam is hitting inboxes around the world, warns GFI. The email, sent from a bogus email address, urges the recipient to join the …
2013: The year of cyber war or just cyber panic?
At the end of the year experts at G Data SecurityLabs are taking a moment to look both back and forward at IT security, attacks and cyber crime. In 2012, online criminals were …
Android botnet spreads SMS spam
Researchers from two security firms have detected widespread SMS spam campaigns aimed at making users download a new Android Trojan that ropes their devices into a mobile …
Carberp-in-the-Mobile found on Google Play
Everybody knows (or should know) that downloading apps from third party online markets is dangerous, but even official markets such as Google Play can’t be considered …
Payment processor for scareware cybercrime ring jailed
A Swedish credit card payment processor was sentenced today to 48 months in prison for his role in an international cybercrime ring that netted $71 million by infecting …
Ransomware arrests highlight online blackmail threat
Detectives from the Police Central e-Crime Unit (PCeU) arrested three people in connection with using ransomware to blackmail people. It has been alleged that computer users …
Exploit tool hitting Joomla and WordPress sites
Joomla and WordPress sites’ administrators should consider updating to the latest version of their respective content management system as soon as possible since, …
Facebook helps Feds take down international cybercrime ring
The Department of Justice and the FBI announced the arrests of 10 individuals from Bosnia and Herzegovina, Croatia, Macedonia, New Zealand, Peru, the United Kingdom, and the …
Bogus hotel websites set up to push a variety of scams
As the end-of-the-year holidays slowly approach, cyber crooks are ramping up their various scammy campaigns. Among these is a relatively new but rather complex combination of …
Malicious QR codes pop up on traffic-heavy locations
QR codes – those matrix barcodes that you can now find almost anywhere – are very handy for directing users to specific sites by simply scanning them with their …
Hackers encrypt medical centre’s patient data, ask for ransom
Russian hackers have apparently managed to break into a server where an Australian medical centre keeps its patients’ records, encrypt the data, and are now asking for …
Most prevalent threat detections of the holiday season
In November, GFI threat researchers encountered email threats disguised as notices from American Express, DHL and UPS as the holiday season kicked into full gear, as well as a …
Featured news
Resources
Don't miss
- AWS launches new cloud security features
- Chaining two LPEs to get “root”: Most Linux distros vulnerable (CVE-2025-6018, CVE-2025-6019)
- Kernel-level container insights: Utilizing eBPF with Cilium, Tetragon, and SBOMs for security
- AI is changing cybersecurity roles, and entry-level jobs are at risk
- From cleaners to creepers: The risk of mobile privilege escalation