Please turn on your JavaScript for this page to function normally.
AutoCAD worm steals blueprints, sends them to China

Duqu and Flame are not the only pieces of malware interested in grabbing AutoCAD files, says ESET researcher Righard Zwienenberg. A sudden spike on ESET’s LiveGrid Early …

Google detects 9500 malicious sites per day

Five years after it was first introduced, Google’s Safe Browsing program continues to provide an invaluable service to the 600 million Chrome, Firefox, and Safari users, …

Flame was developed by US and Israel

Earlier this month, unnamed government sources seemingly confirmed that Stuxnet was developed through a joint effort of the US and Israeli government agencies. Two days prior …

Takedown of Japanese Android malware gang still incomplete

Six men suspected of running an adult site and serving Android malware through it have been recently arrested by the Tokyo Metropolitan Police Department, and the website in …

Zitmo Trojan masquerades as security app

Zeus-in-the-mobile (“Zitmo”) for Android users is back, pretending to be a security solution for the mobile operating platform. It masquerades as “Android …

Identify and block mobile malware on enterprise networks

Sourcefire announced new advancements for delivering visibility and control to help enterprises protect against threats that result from mobility and Bring Your Own Device …

Six arrested for peddling Android malware in Japan

Six men – among which are three IT executives – have been arrested in Japan for having allegedly used Android malware to “earn” themselves over 20 …

Ghost USB honeypot released

Ghost is a honeypot for malware that spreads via USB storage devices. It detects infections with such malware without the need of any further information. The honeypot …

Cloud-based endpoint security with protection for Exchange Server

Panda Security released Panda Cloud Office Protection Advanced, a cloud-based endpoint security solution with protection for Exchange Server. This new module is fully …

Global 2000 networks are vulnerable to Flame-style attacks

Venafi has aggregated scanning data from the networks of 450 Global 2000 enterprises and discovered how frequently MD5-signed certificates are deployed – and it is quite …

Fake Amazon email leads to exploit kit

Fake Amazon order confirmations are hitting inboxes and trying to trick recipients into following any of the links to a page serving the Blackhole exploit kit. The email looks …

Flame and Stuxnet are linked, say researchers

Kaspersky Lab researchers who have been rooting into the code of the Flame toolkit since its discovery believe to have unearthed definitive proof that, at one point in time, …

Don't miss

Cybersecurity news