Server-side polymorphic Android apps
Server-side polymorphism as a technique to serve unique malware versions that evade signature-based detection to Windows users is used by many malware peddlers on a regular …
Kelihos botnet rises up again
Kelihos – the botnet whose operation was disrupted last September by Microsoft and Kaspersky Lab by shutting down its C&C servers and making its bots contact a …
Google reveals it is already scanning Android apps for malware
Even though most malicious Android apps are served from third-party app markets, cyber crooks occasionally manage to disseminate some via Google’s official Android …
Millions of infected Android apps… or not?
Over the weekend, several websites picked up Symantec’s story about Trojanized apps on the official Android Market. This happens from time to time, but what got …
Malware redirects bank phone calls to attackers
Trusteer have discovered a concerning development in some new Ice IX configurations that are targeting online banking customers in the UK and US. Ice IX is a modified variant …
Detecting the DNS Changer malware
January marked half-time for the folks at the DNS Changer Working Group (DCWG) who are now running the DNS servers originally used in the Rove botnet. Ever since a …
Defense companies persistently targeted by cyber spies
Researchers from security companies Zscaler and Seculert have issued a warning about bogus emails targeting employees of defense-related organizations around the world in …
Counterclank: Info-stealing Trojan or advertising tool?
A couple of days ago, Symantec has warned about Counterclank, an Android Trojan that has been unknowingly installed by users on over five million devices. This huge number was …
Compromised WordPress sites lead to Phoenix exploit kit
Several hundred compromised websites that at first glance don’t appear to be malicious have been discovered by M86 researchers. The websites – mostly blogs and …
Students used keyloggers on school computers, changed grades
Three Californian 16-year-olds have been arrested for having allegedly broken into their high school, stolen keys and tests, installed keyloggers onto teachers’ …
Bogus “browser update” pages deliver malware
Fake “browser update” pages are currently being used to deliver malware and redirect users to survey pages, warns GFI. Their malware researchers have recently …
Perplexing malware served on social welfare site
Legitimate compromised sites usually serve malware that directly or indirectly makes money for its peddlers, but ever now and then an exception to that rule arises. …
Featured news
Resources
Don't miss
- Data-stealing VS Code extensions removed from official Marketplace
- Flawed WordPress theme may allow admin account takeover on 22,000+ sites (CVE-2025-4322)
- What good threat intelligence looks like in practice
- AutoPatchBench: Meta’s new way to test AI bug fixing tools
- Third-party cyber risks and what you can do