Please turn on your JavaScript for this page to function normally.
Critical Java 0-day flaw exploited in the wild

Researchers from security firm FireEye have discovered targeted attacks exploiting a zero-day Java vulnerability to deliver the Poison Ivy RAT onto the unsuspecting …

“Tax Payment Rejected” spam campaign

Bogus emails supposedly coming from the US Internal Revenue Service (IRS), informing users that their “tax transaction” has been cancelled and trying to get them …

Crisis malware doesn’t affect most VMware hypervisors

A few days ago Symantec researchers revealed that the Crisis malware is not limited to attacking Mac machines, but has the ability to infect devices running Windows and …

Female Android users targeted with Loozfon Trojan

An information-stealing piece of Android malware that is currently being used in a campaign aimed specifically at female Japanese users has been spotted by Symantec …

Safe Money technology protects online purchases

It’s no secret: most cybercriminals don’t want online fame, they want your money. Kaspersky Lab research shows that each day, more than 1,400 new pieces of banking …

Aramco hackers threaten to attack oil giant again

The group of hackers that claimed responsibility for the recent Saudi Aramco breach has announced that it will be targeting the company again because they want to prove that …

Bogus Booking.com emails carry malware

The popularity of the Booking.com, one of the world’s biggest and most used online hotel reservations agency is getting misused in the latest malware distribution …

Blackberry ID malware campaign

Websense ThreatSeeker Network intercepted a malware campaign targeting Blackberry customers. These fake emails state that the recipient has successfully created a Blackberry …

Fake Android Flash Player contains malware and adware

Malware peddlers are taking advantage of the fact that Adobe has pulled its Flash Player app from Google Play and decided to concentrate on PC browsing and mobile apps bundled …

Mac malware Crisis can spread to different environments

Nearly a month ago a number of security companies have analyzed a new Mac Trojan that opens a backdoor into the affected computer and spies on the user by monitoring mouse …

Beware of bogus email with iPhone 5 details

Malware peddlers are taking advantage of the fact that the next version of Apple’s popular iPhone is due to be released soon by targeting users with specially crafted …

The cyber warfare revolution

F-Secure’s new Threat Report uncovers a security landscape in which focus has shifted away from traditional virus and malware threats to nation state sponsored cyber …

Don't miss

Cybersecurity news