Please turn on your JavaScript for this page to function normally.
Hybrid social engineering attacks

Fraudulent phone calls are increasing in popularity. One possible use for these bogus “bank’ calls is to utilize personal identification information stolen using …

Why do malicious Android apps come from China?

It seems like every time we hear about a malicious application aimed at Android users, it is always distributed by third-party Chinese app markets. You might wonder why the …

Browser bloat and privacy concerns

An increase in browser-based bloat and malware, and growing concern over online tracking technology, will top the technology trends in 2012, according to SlimWare Utilities. …

GFI Software cloud-based anti-malware and anti-spam email security

GFI Software announced that GFI MailEssentials Complete Online, a cloud-based anti-malware and anti-spam email security solution, is now available to small and medium …

Unique malware URLs increased 89 percent

Websites loaded with malware increased a massive 89 percent in the third quarter compared to Q2 2011. According to an IID report, the most impersonated organizations include …

Five million new malware samples

In the third quarter of 2011 alone, five million new malware samples were created. In addition, Trojans set a record for becoming the preferred category for cybercriminals to …

Fake AV peddlers change their tactics

There has been a decline in rogue AV schemes lately, and researchers chalk it up to a combination of law enforcement and security community efforts and an increased coverage …

Duqu installer exploits zero-day bug in Windows kernel

An installer for the Duqu Trojan has been discovered by CrySys, the Hungarian firm that initially discovered the threat, and the file has shed some light onto how the threat …

Online social networks: Malware launch pads

With the advent of social networks, the online world has become a virtual society. Social networks serve as seamless communication channels, but at the same time they are …

Multitasking DevilRobber Trojan targets Mac OS X users

Another week, another Mac OS X Trojan spotted. Both Sophos and Intego have detected a Bitcoin-mining Trojan that also opens a backdoor into the infected system and steals …

ICSA Labs tests products against larger malware set

ICSA Labs, an independent division of Verizon, is now testing products in its Anti-Virus program against virus samples from not only the WildList (a database of real-world …

Duqu not developed by Stuxnet author

The Dell SecureWorks Counter Threat Unit (CTU) research team has been analyzing the Duqu trojan which received a great deal of attention because it is similar to the infamous …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools