cybercriminals
Ransomware appropriates security company logo
Ransomware is still targeting users all over Europe and, as per usual, it shows warnings seemingly coming from police agencies of the country in which the victim resides …
Malware-as-a-service allows victim management
A big amount of the malware out there are RAT (Remote administration tool) samples. This is software created by people specialized on it, people that develop, improve and sell …
Older means wiser to computer security
A new Dimensional Research and ZoneAlarm report found that 18 – 25s are more confident in their security knowledge than 56 – 65s, but have experienced more …
Takedown of Japanese Android malware gang still incomplete
Six men suspected of running an adult site and serving Android malware through it have been recently arrested by the Tokyo Metropolitan Police Department, and the website in …
Anti-theft system for PCs and Android devices
Bitdefender launched an anti-theft system for PCs and Android devices that turns the tables on thieves, giving you control over your phone, laptop or tablet even when …
Six arrested for peddling Android malware in Japan
Six men – among which are three IT executives – have been arrested in Japan for having allegedly used Android malware to “earn” themselves over 20 …
Real life examples on hackers bypassing CAPTCHA
Computer-assisted tools and crowd sourcing can easily bypass traditional anti-spam solutions, forcing CAPTCHAs to evolve to address these techniques, according to Imperva. A …
Fake Amazon email leads to exploit kit
Fake Amazon order confirmations are hitting inboxes and trying to trick recipients into following any of the links to a page serving the Blackhole exploit kit. The email looks …
Fake Craigslist notifications lead to exploit kit
Emails purportedly sent by Craigslist have been hitting users’ inboxes and trying to get them to follow the offered link to a website hosting the Blackhole exploit kit, …
Android spying app masquerades as Gmail
A new piece of Android malware that has recently been unearthed by NQ Mobile researchers is capable of logging text messages and phone calls, as well as record them, and send …
How fraudsters are disguising PCs to fool device fingerprinting
Cybercriminals know that financial and ecommerce providers often use fraud detection systems that monitor for anomalous transactions and behaviors. In order to bypass these …
EURO 2012 lottery scams targets users
The 2012 UEFA European Football Championship kicks off in Poland on Friday, and scammers are trying to trick football fans into thinking the organizers have selected them as …
Featured news
Resources
Don't miss
- Why your security team feels stuck
- It’s time to give AI security its own playbook and the people to run it
- Kanvas: Open-source incident response case management tool
- 6 eye-opening books on AI’s rise, risks, and realities
- Check for CitrixBleed 2 exploitation even if you patched quickly! (CVE-2025-5777)