New versions of Trend Micro enterprise data protection software
Trend Micro now offers completely integrated data protection for messaging and collaboration systems providing many feature advantages for security professionals. ScanMail for …
Japanese defense contractor breached
Mitsubishi Heavy Industries has revealed that its networks have been breached in what is considered the first cyber attack to hit Japan’s defense industry. According to …
Bing, Yahoo! serving malware for popular search terms
Bing results for popular search terms such as “Firefox/Skype/AdobePlayer/uTorrent download” have been poisoned with bogus websites pushing a variety of malware. On …
BIOS rootkit found in the wild
Security researchers have recently discovered a new rootkit that targets computers’ BIOS, making the infection harder to detect and eradicate, and persist even if the …
uTorrent client on official site replaced with scareware
Users that have downloaded the uTorrent software client from the uTorrent.com website on Tuesday morning are warned that they might have ended up with scareware on their …
Improved SpyEye variant actively attacking Android devices
The first SpyEye variant, called SPITMO, has been spotted attacking Android devices in the wild. According to Amit Klein, Trusteer’s chief technology officer, the threat …
Bogus “last words” Facebook app offer leads to malware
Humans have many impulses and fears, and cyber crooks can be counted on exploiting each and every one of them for achieving their purposes. The latest example of this has been …
Multi-layer fraud prevention from IronKey
IronKey introduced the next generation of online banking security: an integrated platform of multiple security controls. This approach reduces the risk of online banking fraud …
Scammers demand $143 from Windows users, threaten with file deletion
German Windows users are the latest target of some pretty brazen scammers, warns Panda Security. The whole thing starts with a Trojan – likely received via spammy emails …
Cybercriminals impersonating government agencies
GFI Software today announced its top 10 most prevalent threat detections for August 2011. Notable threats last month included spam and poisoned search engine results targeting …
Mobile malware criminal command-and-control activity
Criminal operators continue to hone their craft in 2011 using crimeware that can be repurposed for multiple fraud opportunities, sold or leased to other criminals, and that is …
New financial malware attacks global financial institutions
Trusteer warned that a second non-financial malware variant called Shylock has been retrofitted with fraud capabilities and is abusing its large installed base of infected …
Featured news
Sponsored
Don't miss
- How a GRC consultant passed the CISSP exam in six weeks
- BLint: Open-source tool to check the security properties of your executables
- Tailoring responsible AI: Defining ethical guidelines for industry-specific use
- Are you meeting your cyber insurance requirements?
- Black Basta target orgs with new social engineering campaign