Please turn on your JavaScript for this page to function normally.
New versions of Trend Micro enterprise data protection software

Trend Micro now offers completely integrated data protection for messaging and collaboration systems providing many feature advantages for security professionals. ScanMail for …

Japanese defense contractor breached

Mitsubishi Heavy Industries has revealed that its networks have been breached in what is considered the first cyber attack to hit Japan’s defense industry. According to …

Bing, Yahoo! serving malware for popular search terms

Bing results for popular search terms such as “Firefox/Skype/AdobePlayer/uTorrent download” have been poisoned with bogus websites pushing a variety of malware. On …

BIOS rootkit found in the wild

Security researchers have recently discovered a new rootkit that targets computers’ BIOS, making the infection harder to detect and eradicate, and persist even if the …

uTorrent client on official site replaced with scareware

Users that have downloaded the uTorrent software client from the uTorrent.com website on Tuesday morning are warned that they might have ended up with scareware on their …

Improved SpyEye variant actively attacking Android devices

The first SpyEye variant, called SPITMO, has been spotted attacking Android devices in the wild. According to Amit Klein, Trusteer’s chief technology officer, the threat …

Bogus “last words” Facebook app offer leads to malware

Humans have many impulses and fears, and cyber crooks can be counted on exploiting each and every one of them for achieving their purposes. The latest example of this has been …

Multi-layer fraud prevention from IronKey

IronKey introduced the next generation of online banking security: an integrated platform of multiple security controls. This approach reduces the risk of online banking fraud …

Scammers demand $143 from Windows users, threaten with file deletion

German Windows users are the latest target of some pretty brazen scammers, warns Panda Security. The whole thing starts with a Trojan – likely received via spammy emails …

Cybercriminals impersonating government agencies

GFI Software today announced its top 10 most prevalent threat detections for August 2011. Notable threats last month included spam and poisoned search engine results targeting …

Mobile malware criminal command-and-control activity

Criminal operators continue to hone their craft in 2011 using crimeware that can be repurposed for multiple fraud opportunities, sold or leased to other criminals, and that is …

New financial malware attacks global financial institutions

Trusteer warned that a second non-financial malware variant called Shylock has been retrofitted with fraud capabilities and is abusing its large installed base of infected …

Don't miss

Cybersecurity news