Zeus rival boasts of eluding tracker services, fails
Kaspersky Lab expert Jorge Mieres wrote yesterday about Ice IX – the first crimeware based on the leaked Zeus source code. “Ice IX Botnet is the first new …
Bogus emails delivering scanned documents carry malware
Emails posing as scanned documents sent from a Xerox WorkCentre Pro photocopier are again being sent out by malware peddlers, warns Sophos. This is not the first time that …
Install one Trojan, get three more
Downloader Trojans are often used by cyber crooks to thoroughly infect systems in order to extract anything that might be of value to them. Trojan.Badlib is a particularly …
Fake Facebook friend request email leads to malware
Facebook users are once again being targeted with fake emails purportedly coming from the social network, alerting them to a friend request. A click on the offered …
Malware targeting Android jumps 76 percent
The amount of malware targeted at Android devices jumped 76 percent since last quarter, to become the most attacked mobile operating system, according to McAfee. 2011 has also …
Ramnit worm uses Zeus Trojan tactics for banking fraud
Trusteer discovered the 18 month old file infecting worm Win32.Ramnit has morphed into financial malware and is actively attacking banks to commit online fraud. Ramnit …
Chinese mobile phone monitoring service found
What do you think cyber crooks do with the information collected from mobile phones by malware? Trend Micro has one of the answers to that question. Its researchers have …
Trojanized Android app intercepts messages to hide costly subscriptions
Another trojanized Android app that monitors received text messages for keywords has been uncovered by Trend Micro, and this time, the feature is not used for spying but to …
Emerging threats: Attacks via MIPS devices
First of all, if something has already been invented and has been seen in-the-wild more than once, it’s very likely to occur again and again, especially if the attacks …
Keeping abreast of Web malware delivery techniques
One of the crucial things that Google must do to keep making Internet users use its search engine is to keep an eye on the many ways that cyber criminals employ to spread …
“Uniform traffic ticket” spam leads to malware
A massive spam campaign taking the form of an email notifying the recipients of a bogus traffic ticket has been detected by a number of security companies. The email in …
RSA proactively blocks malware threats
RSA announced updates to its CyberCrime Intelligence Service designed to help enterprises monitor and harden their infrastructure against malware infection and data loss. This …
Featured news
Sponsored
Don't miss
- Prompt Fuzzer: Open-source tool for strengthening GenAI apps
- How insider threats can cause serious security breaches
- Most people still rely on memory or pen and paper for password management
- What AI can tell organizations about their M&A risk
- Breaking down the numbers: Cybersecurity funding activity recap