Malware surpassed 75 million samples in 2011
McAfee released its latest threats report, revealing that malware surpassed the company’s estimate of 75 million unique malware samples last year. Although the release …
Syrian dissidents claim government uses malware to spy on them
Syrian opposition activists have been targeted by the government since the start of the massive anti-government protests in January 2011, but only recently they have began to …
Trend Micro makes HijackThis open source
Trend Micro released HijackThis as an open source application. The code, originally written in Visual Basic, is now officially available at SourceForge. HijackThis scans your …
Forensic toolkit with malware analysis technology
AccessData released Forensic Toolkit 4 (FTK) that gives organizations affordable access to more advanced incident response and remote investigative capabilities. Using FTK, …
Cutwail botnet intensifies spam spewing
The old Cutwail botnet is still alive and spamming from its 1,5 million bots, and has lately been spotted using malicious HTML attachments. The spam emails vary from fake …
How mobile malware is maturing
Mobile malware has reached a new stage of maturation, according to Juniper Networks. Top findings from Juniper’s 2011 Mobile Threats Report are evidence of accelerating …
Ransomware impersonates the Italian police
Ransomware targeting Italian-speaking users is being served from compromised websites via malicious JavaScript code, warns Total Defense’s Rossano Ferraris. The users …
Fake Facebook notification delivers keylogger
Fake Facebook notifications about changes in users’ account information have been hitting inboxes and delivering malware to unwary users, warn BarracudaLabs researchers. …
New powerful bot spreads by email
PandaLabs reported the presence of a powerful new bot called Ainslot.L. This malware is designed to log user activities, download additional malware and take control of …
Analyze mobile apps for malware threats
Trend Micro announced Mobile App Reputation, a technology that can automatically identify, analyze and rate mobile applications for issues that could include malware, …
Malicious sites increase 240%
In 2011, the most significant evolution in the threat landscape was the use of malware networks, or malnets, to launch highly dynamic Web-based attacks, according to Blue Coat …
The rise of information stealers and pay-per-install malware
The fastest growing malware categories in the second half of 2011 were PPI (Pay-Per-Installs) and information stealers that target user credentials enabling the theft of key …
Featured news
Resources
Don't miss
- Data-stealing VS Code extensions removed from official Marketplace
- Flawed WordPress theme may allow admin account takeover on 22,000+ sites (CVE-2025-4322)
- What good threat intelligence looks like in practice
- AutoPatchBench: Meta’s new way to test AI bug fixing tools
- Third-party cyber risks and what you can do