Ransomware uses browser history to persuade users to pay up
A new ransomware variant dubbed Kovter has been spotted trying out a brand new approach for convincing targeted users of the legitimacy of its claims. According a malware …
Complex malware and BYOD drive mobile security
Mobile malware has advanced to a new level of sophistication as smart devices continue to gain ground. The number of unique mobile threats grew by 261% in just two quarters. …
8 in 10 companies suffered web-borne attacks
The vast majority of organizations that allow employees to freely access the Web are experiencing high rates of malware threats, including phishing attacks, spyware, …
Backdoor Trojan picks up commands from Evernote account
Trend Micro researchers have recently analyzed a backdoor Trojan that contacts an unusual command and control center – an Evernote account. The backdoor – dubbed …
Malware analysis: Collaboration, automation and training
Whether you’re a novice or a professional at analyzing malicious code, you’ll have a desire to learn or pass on that skill. Most malicious code analysis is …
Activists now targeted with trojanized backdoor apps
Phishing emails targeting Tibetan and Uyghur activists and containing spying malware masquerading as legitimate DOC and PDF files are nothing new, as such spam campaigns have …
Real-time apps and FTP are preferred malware targets
Palo Alto Networks published an analysis of new and evasive malware in live enterprise networks. Their findings show that traditional antivirus solutions are not identifying …
Fake BBC emails lead to Blackhole, Zeus
Spam emails supposedly coming from CNN and the BBC and delivering links to trending news stories have once again become the preferred way for malware peddlers to lure …
Malware pushers poison MSN Messenger search results
As the date when the MSN Messenger is scheduled to be phased out speedily approaches, it is getting harder to find an installer for it online, so malware peddlers gave rushed …
Beware of fake Candy Crush apps on Google Play
Whenever a mobile game becomes hugely popular, it also becomes a great way for scammers and malware peddlers to lure users into unknowingly installing malicious apps on their …
Becoming a malware analyst
There are few jobs in this industry that seem as appealing and interesting to me as that of a malware analyst. In my mind, these professionals were waking up each day to …
Free Android malware analysis tool
Bluebox Labs announced Dexter, a free tool to help researchers and enterprise security teams analyze applications for malware and vulnerabilities. The Dexter platform provides …
Featured news
Resources
Don't miss
- Building a healthcare cybersecurity strategy that works
- AI-generated images have a problem of credibility, not creativity
- The five-minute guide to OT cyber resilience
- Another remotely exploitable Oracle EBS vulnerability requires your attention (CVE-2025-61884)
- Apple offers $2 million for zero-click exploit chains