Stealing money from ATMs with malware
This talk from the 30th Chaos Communication Congress will discuss a case in which criminals compromised and robbed an ATM by infecting it with specially crafted malware. The …
How to make malware warnings more effective?
An effective security warning is concrete and clear, appeals to authority, and doesn’t pop up too often, say the results of a study into the psychology of malware …
WoW gamers targeted with trojanized Curse client
The DDoS attacks that temporarily took down Blizzard’s Battle.net and Valve’s Steam online gaming services over the end of the year holidays have undoubtedly …
Yahoo visitors got served with malicious ads
Visitors to the main Yahoo domain have been targeted with malicious ads that redirected them to an exploit kit serving different types of malware, the Dutch security audit …
Mariposa bot author sentenced to prison
Matjaz Skorjanc, a.k.a. Iserdo, was sentenced to four years and ten months in prison last week by the District Court in Maribor, Slovenia. He was found guilty of manufacturing …
Sophisticated and targeted attacks on the horizon
As 2013 draws to a close, Gavin Millard a security expert from Tripwire gazes into his crystal ball and predicts what 2014 has in store for us. Targeted mobile attacks will …
ZeroAccess botnet down for good?
When Microsoft and various law enforcement agencies around the world disrupted the ZeroAccess botnet at the beginning of December, they did not expect to fully eliminate it. …
Fake Adobe “licence key delivery” emails carry malware
A clever malware distribution campaign is currently doing rounds, taking the form of emails purportedly delivering licence keys for a number of Adobe’s software …
DDoS botnet spreading on Linux and Windows machines
A blended DDoS botnet consisting of both Windows and Linux machines has been detected by researchers working with the Polish CERT. The botnet is exclusively dedicated to …
Effective new Trojan skims card info from widely used ATMs
Researchers from Russian AV company Doctor Web have managed to get their hands on a Trojan aimed at recording and collecting card information from one of the most widespread …
Easily deflected ransomware relies on victims’ embarrassment
The appearance of Browlock ransomware earlier this year demonstrates that this type of malware does not need to wreak much havoc on the targets’ computer to be taken …
What’s the greatest security risk?
While boardrooms across the U.S. report growing prioritization of endpoint security, risk continues to grow and evolve and IT departments are racing to keep up, according to a …
Featured news
Resources
Don't miss
- NTLM relay attacks are back from the dead
- Africa’s cybersecurity crisis and the push to mobilizing communities to safeguard a digital future
- Google open-sources privacy tech for age verification
- You can’t trust AI chatbots not to serve you phishing pages, malicious downloads, or bad code
- Cisco fixes maximum-severity flaw in enterprise unified comms platform (CVE-2025-20309)