The practice of insecure collaboration
Most often sensitive information exchanged beyond the firewall with business partners and customers is still primarily conducted through email and consumer-grade file sharing …
Europeans targeted with new ransomware
In the last couple of years, malware that hijacks the users’ machines and demands money to “unblock” it has become an often encountered threat. Messages …
Fake LinkedIn emails serve malware
Emails purportedly coming from business-related social network LinkedIn have been hitting inboxes in the last couple of days, ostensibly reminding recipients of invitations …
Fake Google Play site serves Android malware
Online scammers are known for their adaptability, so it should not come as a surprise that the recent name change of Google’s official Android Market – now dubbed …
Most notorious Android malware
Total Defense announced the findings of its 2011 Internet Security Threat Intelligence Report, which indicates Android’s rise in market share was only surpassed by the …
Profile Analyzer: Protect websites from cyber attacks
Silver Tail Systems announced Profile Analyzer, which provides real-time analysis of both individual user behavior and crowd behavior on websites to identify malicious …
Malware sophistication worries IT leaders
More than half of IT leaders (62 percent) fear that malware is growing more sophisticated faster than they can upgrade their analysis capabilities. Additionally, 58 percent …
Fake online streaming service phishes and robs users
With high-speed Internet being now a common enough thing in many parts of the world, many users have taken to watching films and videos via online streaming. Unfortunately, …
China escalating Tibetan cold war into cyberspace
AlienVault has discovered a range of spear phishing attacks taking place against a number of Tibetan organizations, apparently from Chinese attackers. The attacks signal a …
New online banking fraud schemes target mobile users
Trusteer uncovered two online banking fraud schemes designed to defeat one time password (OTP) authorization systems used by many banks. Unlike a previous attack Trusteer …
Users hammered by fake AV resurgence
GFI Software released its VIPRE Report for February 2012, a collection of the 10 most prevalent threat detections encountered during the month. Most notably, GFI Labs has been …
Scareware hides files and folders, offers fix for $80
BitDefender researchers have recently come across a nasty piece of scareware that tricks victims into believing that all their files and folders have disappeared due to hard …
Featured news
Resources
Don't miss
- Data-stealing VS Code extensions removed from official Marketplace
- Flawed WordPress theme may allow admin account takeover on 22,000+ sites (CVE-2025-4322)
- What good threat intelligence looks like in practice
- AutoPatchBench: Meta’s new way to test AI bug fixing tools
- Third-party cyber risks and what you can do