Cutwail botnet now spreads Android malware
Successful malware peddlers are always thinking up new ways of delivering malware to unsuspecting users. In the past Android malware was mostly served on third-party online …
“Your private naked photos online” emails lead to total computer compromise
Malware peddlers continue to use the old “your naked photos online” lure to trick users into following malicious links or downloading malicious attachments, warns …
Bitdefender launches Antivirus Free for Android
Bitdefender has launched Antivirus Free for Android, which offers smartphone owners a free, fast and powerful antivirus solution that taps the latest in-the-cloud scanning …
Bitcoin-mining Trojan lurking on Skype
Bitcoin-mining malware is nothing new, but with the success of Bitcoin and the renewed interest it is receiving lately, cyber crooks are again concentrating their efforts to …
Carberp Trojan developers arrested in Ukraine
The mastermind behind the Carberp Trojan and the developers that helped created it have apparently been arrested in Ukraine in a joint action by the Security Service of …
Flashback malware author unmasked?
An estimated 38,000 users is still infected with the Flashback Trojan, the first malware targeting Mac users that didn’t have to get their permission to be downloaded, …
Wide variety of malware lurking in Skype messages
A new malware-spreading campaign is targeting Skype users, warns Dancho Danchev. The attack is mounted via malware-infected users whose compromised Skype account is set to …
Malware attacks occur every three minutes
Malware activity has become so pervasive that organizations experience a malicious email file attachment or Web link as well as malware communication that evades legacy …
Thousands of compromised Apache servers direct users to malware
What do the recent compromises of a number of LA Times websites and the blog of hard disk drive manufacturer Seagate have in common? According to several security researchers, …
Banking Trojan disguised as innocuous Word and WinHelp files
Part of the job of a malware author is to constantly think up new ways of outsmarting researchers and bypassing automatic detection methods used by antivirus and other …
Aggressive Android adware and malware on the rise
With adware gleaning more user data from people devices than they would normally need too and developers bundle more than one adware framework into their apps, user privacy is …
Trojan phishes for credit card info through fake Facebook page
An insidious Trojan is targeting Facebook users and getting them to share confidential personal and credit card information that will then be used to perform fraudulent …
Featured news
Resources
Don't miss
- Building a healthcare cybersecurity strategy that works
- AI-generated images have a problem of credibility, not creativity
- The five-minute guide to OT cyber resilience
- Another remotely exploitable Oracle EBS vulnerability requires your attention (CVE-2025-61884)
- Apple offers $2 million for zero-click exploit chains