Please turn on your JavaScript for this page to function normally.
New Mac Trojan copies successful Windows Trojan technique

Windows users have been warned time and time again of malware hiding behind icons and extensions belonging to files associated with legitimate software – most notably …

Over 300 cyberspy attacks against Russian targets discovered

Trend Micro researchers have discovered that 1465 computers belonging to 47 distinct political and economical entities in 61 different (mostly former Soviet Union) countries …

Fake stores dominant threat due to blackhat SEO

“Searches for buying software online remains 90 percent malicious, redirecting users to fake stores,” concluded Julian Sobrier recently, after having analyzed the …

A botnet for the masses

Did you know that you can buy a bot for just 10 Euros? Researchers of German security firm G Data have discovered that a bot builder dubbed “Aldi Bot” is currently …

“We are going to sue you” spam campaign leads to malware

Every once in a while, security researchers spot an email spam campaign so poorly thought out and executed that I have to wonder: “Who would fall far this?” But …

Kaspersky One: Universal security for multi-device protection

Kaspersky Lab announced Kaspersky One, a “Universal Security” solution that ensures protection across a wide selection of platforms and devices. Using a single …

AVG Business Edition 2012 released

AVG Technologies announced AVG Business Edition 2012, a security software solution for SMBs. In a nutshell, AVG Business Edition 2012: Delivers more – with respect to …

Skype users targeted with calls spreading fake AV

Showing considerable resourcefulness in their attempt to trick Internet users, fake AV peddlers have begun targeting Skype users with an unexpected call. “Attention: …

Cybercriminals find new ways to disguise spam

It used to be that malicious attachments came in emails with erotic photos of girls who “want to meet you”, or “scandalous photos” of celebrities. Now, …

Securing virtual environments and reducing malware risk

Rapid7 announced that the new version of its vulnerability management solution, Nexpose 5.0, will address the complex security challenges presented by the wide scale adoption …

Pay-per-install services attempt discreet comeback

“Pay-per-install businesses can be temporarily compromised by welcome law enforcement action, but the crooks will always find a way to return,” says McAfee’s …

New versions of Trend Micro enterprise data protection software

Trend Micro now offers completely integrated data protection for messaging and collaboration systems providing many feature advantages for security professionals. ScanMail for …

Don't miss

Cybersecurity news