Please turn on your JavaScript for this page to function normally.
Zeus rival boasts of eluding tracker services, fails

Kaspersky Lab expert Jorge Mieres wrote yesterday about Ice IX – the first crimeware based on the leaked Zeus source code. “Ice IX Botnet is the first new …

Bogus emails delivering scanned documents carry malware

Emails posing as scanned documents sent from a Xerox WorkCentre Pro photocopier are again being sent out by malware peddlers, warns Sophos. This is not the first time that …

Install one Trojan, get three more

Downloader Trojans are often used by cyber crooks to thoroughly infect systems in order to extract anything that might be of value to them. Trojan.Badlib is a particularly …

Fake Facebook friend request email leads to malware

Facebook users are once again being targeted with fake emails purportedly coming from the social network, alerting them to a friend request. A click on the offered …

Malware targeting Android jumps 76 percent

The amount of malware targeted at Android devices jumped 76 percent since last quarter, to become the most attacked mobile operating system, according to McAfee. 2011 has also …

Ramnit worm uses Zeus Trojan tactics for banking fraud

Trusteer discovered the 18 month old file infecting worm Win32.Ramnit has morphed into financial malware and is actively attacking banks to commit online fraud. Ramnit …

Chinese mobile phone monitoring service found

What do you think cyber crooks do with the information collected from mobile phones by malware? Trend Micro has one of the answers to that question. Its researchers have …

Trojanized Android app intercepts messages to hide costly subscriptions

Another trojanized Android app that monitors received text messages for keywords has been uncovered by Trend Micro, and this time, the feature is not used for spying but to …

Emerging threats: Attacks via MIPS devices

First of all, if something has already been invented and has been seen in-the-wild more than once, it’s very likely to occur again and again, especially if the attacks …

Keeping abreast of Web malware delivery techniques

One of the crucial things that Google must do to keep making Internet users use its search engine is to keep an eye on the many ways that cyber criminals employ to spread …

“Uniform traffic ticket” spam leads to malware

A massive spam campaign taking the form of an email notifying the recipients of a bogus traffic ticket has been detected by a number of security companies. The email in …

RSA proactively blocks malware threats

RSA announced updates to its CyberCrime Intelligence Service designed to help enterprises monitor and harden their infrastructure against malware infection and data loss. This …

Don't miss

Cybersecurity news