Please turn on your JavaScript for this page to function normally.
Android officially the primary target for new mobile malware

The Android mobile operating system solidified its lead as the primary target for new mobile malware, according to McAfee. The amount of malware targeted at Android devices …

Yet another Trojan based on Spitmo source code surfaces

Even though nearly all new mobile malware in Q3 was aimed at Android phones, users with mobile devices running other mobile platforms are far from safe. F-Secure researchers …

Backdoor Trojan pushed via versatile Facebook campaign

Thanks to its social nature, Facebook is one of the preferred tools of cyber crooks looking to scam users and peddle malware. Microsoft recently spotted a considerably …

DevilRobber Trojan returns, masquerades as PixelMator

DevilRobber, the latest Trojan to target Mac users, got updated. As you may remember, the previous incarnation stole Bitcoins from the user’s wallet file, used the …

Teach children about online protection

In an effort to facilitate effective parent-child dialogue about Internet dangers, Trend Micro developed an eGuide with tips to help families have “The Talk” about …

Forensics for advanced threat activity

Damballa announced Failsafe 5.0, a solution that hunts for undetected threats by correlating a variety of observed network behaviors that indicate malware-infected devices …

Trojan masquerading as PDF signed with stolen government certificate

Since the discovery of the Stuxnet worm, and especially after the recent string of certification authority compromises, cyber attackers’ practice of using digital …

Block cipher encryption effectively hides banking Trojan

Brazilian malware peddlers have turned to encrypting banking Trojans with block ciphers, effectively bypassing most AV software. Kaspersky Lab’s Dmitry Bestuzhev says …

New techniques for detecting hardware Trojans

Most Internet users know about the existence of software Trojans, but that of hardware ones is less known. They consist of integrated circuits that have been modified by …

Cybercriminals exploiting user inexperience

Noteworthy threats in October 2011 included the return of a rogue web browser, a phony hacking tool for Gmail account password recovery and malware disguised as advertisements …

Norman releases endpoint protection system

Norman released Endpoint Protection 9, which stops all kinds of malware threats including viruses, worms, trojans, spyware, adware, bots, zero-day threats and rootkits. …

Bitdefender prevents scams on Twitter

Bitdefender is adding a tool to its arsenal to prevent scams on Twitter. Safego has emerged successful from beta testing by Twitter users and will be incorporated into …

Don't miss

Cybersecurity news