Google Go programming language used for creating destructive Trojan
When Google introduced its Go programming language in 2009, they surely didn’t hope for it to be used for writing malware but, as these things go, it was a only a matter …
Analysis of Flame C&C servers reveals more unknown malware
Since its discovery by Kaspersky Lab and CrySyS researchers back in May, the Flame malware and its C&C infrastructure are being analyzed for additional clues on who might …
Foreign journalists in China targeted with malware-laden emails
Foreign news correspondents stationed in China have recently become targets of two separate but similar malware attacks aimed at stealing information from their computers, …
The various spam campaigns leading to Blackhole
At any given time, there is a considerable number of email spam campaigns that ultimately lead users to pages hosting exploit kits – more often then not the extremely …
Android malware threats analysis
Bitdefender released its August 2012 Android malware threats report. While in August the percentage of adware-bundled apps dropped to 55.15 per cent, from July’s 77.34 …
Microsoft’s study into unsecure supply chains leads to botnet disruption
Microsoft’s Digital Crimes Unit has disrupted the functioning of yet another botnet by effecting a takedown of a domain which was also hosting over 500 different strains …
Blackhole 2.0 is out with new exploits and same price
A new version of BlackHole, one of the most popular exploit kits out there, has been made available by its creator, who has supposedly rewritten it from scratch. BlackHole 2.0 …
French energy company targeted with faulty malware
A researcher of Norwegian security firm Norman has recently come across and analyzed a peculiar malware sample that was likely aimed at compromising computers of employees of …
Jump in mobile app and banking scams
In August, GFI threat researchers identified a number of high-profile fake mobile application scams, along with a spike in email scams targeting UK banking and government …
Bogus GTA Vice City Android game leads to SMS Trojan
Offering bogus packs of popular games have always been a well-liked approach of malware peddlers around the world. GFI has recently spotted a fictitious Vice City version of …
Who is the most dangerous cyber celebrity?
Emma Watson has replaced Heidi Klum as McAfee’s 2012 most dangerous celebrity to search for online. For the sixth year in a row, McAfee researched popular …
Mobile malware has become a profitable industry
Lookout released its State of Mobile Security Report 2012 which explains the issues that individuals faced on mobile devices this year and explores the prominent trends in …
Featured news
Resources
Don't miss
- NTLM relay attacks are back from the dead
- Africa’s cybersecurity crisis and the push to mobilizing communities to safeguard a digital future
- Google open-sources privacy tech for age verification
- You can’t trust AI chatbots not to serve you phishing pages, malicious downloads, or bad code
- Cisco fixes maximum-severity flaw in enterprise unified comms platform (CVE-2025-20309)