Malware analysis for Virtual Desktop Infrastructures
HBGary unveiled Active Defense 1.3 to provide live, runtime memory analysis of concurrent Guest OS sessions with minimal impact on the shared physical resources of the …
Cutwail botnet now spreads Android malware
Successful malware peddlers are always thinking up new ways of delivering malware to unsuspecting users. In the past Android malware was mostly served on third-party online …
“Your private naked photos online” emails lead to total computer compromise
Malware peddlers continue to use the old “your naked photos online” lure to trick users into following malicious links or downloading malicious attachments, warns …
Bitdefender launches Antivirus Free for Android
Bitdefender has launched Antivirus Free for Android, which offers smartphone owners a free, fast and powerful antivirus solution that taps the latest in-the-cloud scanning …
Bitcoin-mining Trojan lurking on Skype
Bitcoin-mining malware is nothing new, but with the success of Bitcoin and the renewed interest it is receiving lately, cyber crooks are again concentrating their efforts to …
Carberp Trojan developers arrested in Ukraine
The mastermind behind the Carberp Trojan and the developers that helped created it have apparently been arrested in Ukraine in a joint action by the Security Service of …
Flashback malware author unmasked?
An estimated 38,000 users is still infected with the Flashback Trojan, the first malware targeting Mac users that didn’t have to get their permission to be downloaded, …
Wide variety of malware lurking in Skype messages
A new malware-spreading campaign is targeting Skype users, warns Dancho Danchev. The attack is mounted via malware-infected users whose compromised Skype account is set to …
Malware attacks occur every three minutes
Malware activity has become so pervasive that organizations experience a malicious email file attachment or Web link as well as malware communication that evades legacy …
Thousands of compromised Apache servers direct users to malware
What do the recent compromises of a number of LA Times websites and the blog of hard disk drive manufacturer Seagate have in common? According to several security researchers, …
Banking Trojan disguised as innocuous Word and WinHelp files
Part of the job of a malware author is to constantly think up new ways of outsmarting researchers and bypassing automatic detection methods used by antivirus and other …
Aggressive Android adware and malware on the rise
With adware gleaning more user data from people devices than they would normally need too and developers bundle more than one adware framework into their apps, user privacy is …
Featured news
Resources
Don't miss
- January 2026 Patch Tuesday forecast: And so it continues
- How AI agents are turning security inside-out
- Security teams are paying more attention to the energy cost of detection
- Recently fixed HPE OneView flaw is being exploited (CVE-2025-37164)
- PoC released for unauthenticated RCE in Trend Micro Apex Central (CVE-2025-69258)