New Zeus-based variant targets banks around the world
Another Zeus-based offering has been unearthed by Trend Micros researchers, and by the look of things, this one seems to be better crafted than the recently discovered Ice IX …
Morto worm surprises again
As it turns out, the recently discovered Morto worm that has been spreading in the wild has more than one never-before-seen characteristic. Not only does it spread by using …
Blackhat SEO spam is a global problem
If you have wondered whether to switch your go-to search engine for another – perhaps more localized? – in order to avoid the seemingly ubiquitous poisoned search …
U.S. cities most vulnerable to online threats
Who is most at risk of fraudulent credit card charges, stolen identities, email security breaches or lost personal data? An AVG survey of online and mobile consumer behaviors …
AVG Internet Security 2012 released
AVG announced the availability of AVG Internet Security 2012, the latest edition of its internet security software. In addition to AVG’s multi-layered protection, …
Malicious infections enter 99% of enterprise networks
There is a significant gap in today’s enterprise IT defenses, as advanced malware and targeted attacks are easily evading traditional defenses, such as firewalls, …
2011: Year of the hack
In a year that IT security experts have labeled the “Year of the Hack,” Bit9’s endpoint survey of 765 IT executives revealed that Advanced Persistent Threat …
Morto worm spreads via RDP, brute-forces Administrator accounts
There’s a new worm in town and it’s the first one that spreads by taking advantage of the Remote Desktop Protocol (RDP). “Once a machine gets infected, the …
Fake Facebook friend request, now with hidden iFrame
A slight variation of last week’s Facebook friend request spam email campaign has been spotted targeting the social network’s users, and this one employs a …
Google search results much cleaner than in 2010
It used to be that among the first ten pages of search results for popular terms, up to 90 percent of the offered links would take the users to a malicious page serving …
Illegal keygen for well-known AV solution leads to infection
An illegal key generator for the recently released latest version of the TrustPort Internet Security solution brings big trouble to unsuspecting users, warns BitDefender. …
Bitcoin mining botnet also used for DDoS attacks
A recently discovered P2P Bitcoin mining botnet has acquired DDoS capabilities, warns Kaspersky Lab expert Tillmann Werner. It’s main reason of existence has so far been …
Featured news
Sponsored
Don't miss
- Most people still rely on memory or pen and paper for password management
- What AI can tell organizations about their M&A risk
- Breaking down the numbers: Cybersecurity funding activity recap
- Applying DevSecOps principles to machine learning workloads
- Overcoming GenAI challenges in healthcare cybersecurity