Who is the most dangerous cyber celebrity?
Emma Watson has replaced Heidi Klum as McAfee’s 2012 most dangerous celebrity to search for online. For the sixth year in a row, McAfee researched popular …
Mobile malware has become a profitable industry
Lookout released its State of Mobile Security Report 2012 which explains the issues that individuals faced on mobile devices this year and explores the prominent trends in …
Zero-day-loving Google hackers furiously active in last three years
The hackers behind the Aurora attacks that were discovered targeting Google, Adobe and other big U.S. companies in 2009 have seemingly been working hard ever since. Symantec …
Shamoon attacks persist
While it still unknown whether the recent attacks against Saudi Aramco and RasGas were part of the so-called Shamoon attacks, the latter are continuing unabated, says …
Kaspersky Lab protects Linux mail servers
Kaspersky Lab announced Kaspersky Linux Mail Security, which can be integrated into a variety of Linux-based mail server configurations to fight spam and block malicious …
FinFisher commercial spyware toolkit goes mobile
The existence of FinFisher, a commercial spyware toolkit created by UK-based Gamma Group International, has recently grabbed the attention of the general public when two …
Largest malware rise in four years
McAfee found the biggest increase in malware samples detected in the last four years. McAfee Labs detected a 1.5 million increase in malware since Q1 2012 and identified new …
Google users targeted with malware-laden “Suspicious sign in” notices
Emails purportedly sent by the Google Accounts Team warning about a prevented “suspicious sign- in” have been spotted targeting Google users. “Someone …
Fake Amazon emails open the way for malware
The CVE-2012-4681 Java zero-day vulnerability might have been patched, but because it was added to the popular Blackhole exploit kit and because most users regularly forego …
76% of IT pros in the dark about unauthorized application downloads
While IT professionals recognize the dangers that unauthorized applications cause to their networks, most are letting these dangers go unnoticed, according to a survey by …
“Win 8 Security System” rogue AV spotted
Windows 8 has not yet been released and cyber crooks are already taking advantage of its name. McAfee researchers have recently spotted a new rogue AV solution dubbed …
Spoofed Microsoft notification leads to Zeus
Microsoft has updated its Services Agreement last week, and has begun notifying its users about the change via email. Eager to take advantage of any kind of legitimate opening …
Featured news
Resources
Don't miss
- Building a healthcare cybersecurity strategy that works
- AI-generated images have a problem of credibility, not creativity
- The five-minute guide to OT cyber resilience
- Another remotely exploitable Oracle EBS vulnerability requires your attention (CVE-2025-61884)
- Apple offers $2 million for zero-click exploit chains