Beware of fake Google AV
Cyber crooks are once again trying to take advantage of Google’s name and logo to push malware onto unsuspecting users. According to GFI researchers, a number of pages …
The practice of insecure collaboration
Most often sensitive information exchanged beyond the firewall with business partners and customers is still primarily conducted through email and consumer-grade file sharing …
Europeans targeted with new ransomware
In the last couple of years, malware that hijacks the users’ machines and demands money to “unblock” it has become an often encountered threat. Messages …
Fake LinkedIn emails serve malware
Emails purportedly coming from business-related social network LinkedIn have been hitting inboxes in the last couple of days, ostensibly reminding recipients of invitations …
Fake Google Play site serves Android malware
Online scammers are known for their adaptability, so it should not come as a surprise that the recent name change of Google’s official Android Market – now dubbed …
Most notorious Android malware
Total Defense announced the findings of its 2011 Internet Security Threat Intelligence Report, which indicates Android’s rise in market share was only surpassed by the …
Profile Analyzer: Protect websites from cyber attacks
Silver Tail Systems announced Profile Analyzer, which provides real-time analysis of both individual user behavior and crowd behavior on websites to identify malicious …
Malware sophistication worries IT leaders
More than half of IT leaders (62 percent) fear that malware is growing more sophisticated faster than they can upgrade their analysis capabilities. Additionally, 58 percent …
Fake online streaming service phishes and robs users
With high-speed Internet being now a common enough thing in many parts of the world, many users have taken to watching films and videos via online streaming. Unfortunately, …
China escalating Tibetan cold war into cyberspace
AlienVault has discovered a range of spear phishing attacks taking place against a number of Tibetan organizations, apparently from Chinese attackers. The attacks signal a …
New online banking fraud schemes target mobile users
Trusteer uncovered two online banking fraud schemes designed to defeat one time password (OTP) authorization systems used by many banks. Unlike a previous attack Trusteer …
Users hammered by fake AV resurgence
GFI Software released its VIPRE Report for February 2012, a collection of the 10 most prevalent threat detections encountered during the month. Most notably, GFI Labs has been …
Featured news
Resources
Don't miss
- Training an AI agent to attack LLM applications like a real adversary
- You don’t have to choose between BAS or automated pentesting, you shouldn’t
- Why your phishing simulations aren’t building a security culture
- Your security stack looks fine from the dashboard and that’s the problem
- Kali Linux 2026.1 ships BackTrack mode, eight new tools, and a kernel upgrade to 6.18