DevilRobber Trojan returns, masquerades as PixelMator
DevilRobber, the latest Trojan to target Mac users, got updated. As you may remember, the previous incarnation stole Bitcoins from the user’s wallet file, used the …
Teach children about online protection
In an effort to facilitate effective parent-child dialogue about Internet dangers, Trend Micro developed an eGuide with tips to help families have “The Talk” about …
Forensics for advanced threat activity
Damballa announced Failsafe 5.0, a solution that hunts for undetected threats by correlating a variety of observed network behaviors that indicate malware-infected devices …
Trojan masquerading as PDF signed with stolen government certificate
Since the discovery of the Stuxnet worm, and especially after the recent string of certification authority compromises, cyber attackers’ practice of using digital …
Block cipher encryption effectively hides banking Trojan
Brazilian malware peddlers have turned to encrypting banking Trojans with block ciphers, effectively bypassing most AV software. Kaspersky Lab’s Dmitry Bestuzhev says …
New techniques for detecting hardware Trojans
Most Internet users know about the existence of software Trojans, but that of hardware ones is less known. They consist of integrated circuits that have been modified by …
Cybercriminals exploiting user inexperience
Noteworthy threats in October 2011 included the return of a rogue web browser, a phony hacking tool for Gmail account password recovery and malware disguised as advertisements …
Norman releases endpoint protection system
Norman released Endpoint Protection 9, which stops all kinds of malware threats including viruses, worms, trojans, spyware, adware, bots, zero-day threats and rootkits. …
Bitdefender prevents scams on Twitter
Bitdefender is adding a tool to its arsenal to prevent scams on Twitter. Safego has emerged successful from beta testing by Twitter users and will be incorporated into …
Fake Kaspersky AV solution offered via spam emails
Rogue AV software mimicking popular legitimate AV solutions is occasionally offered by cyber crooks in the hopes that the familiar name and look will entice users into buying …
Protection against Duqu malware
A new vulnerability in Windows has been recently identified and is already exploited in the wild. For now, only a handful of targeted attacks have been found. The …
Unknown malware rampant in enterprise networks
New research from Palo Alto Networks shows that targeted and unknown malware are a reality in enterprise networks today, finding hundreds of unique, previously-unknown malware …
Featured news
Resources
Don't miss
- Data-stealing VS Code extensions removed from official Marketplace
- Flawed WordPress theme may allow admin account takeover on 22,000+ sites (CVE-2025-4322)
- What good threat intelligence looks like in practice
- AutoPatchBench: Meta’s new way to test AI bug fixing tools
- Third-party cyber risks and what you can do