Critical vulnerabilities triple in 2011
Adoption of mobile devices such as smartphones and tablets in the enterprise, including the “Bring Your Own Device” approach, which allows personal devices to …
Mail-borne polymorphic malware soars
Approximately 72% of all email-borne malware in September could be characterized as aggressive strains of generic polymorphic malware, says Symantec in its September 2011 …
“ACH Payment Canceled” spam leads to malware
After a short pause, the failed/cancelled ACH transaction spam is hitting inboxes again. Since yesterday, Websense has intercepted over 200,000 of the following emails: The …
Alureon extracts backup C&C locations embedded in images
An Alureon Trojan variant designed to extract the location of backup C&C centers from images disseminated across the Web has been discovered by a Microsoft researcher. …
McAfee All Access secures all Internet connected devices
A week after the Kaspersky One announcement, McAfee announced the availability of cross-device security solution that protects Internet-connected devices. McAfee All Access is …
Mysql.com hacked, serving malware
Mysql.com has been hacked and is currently serving malware, Armorize warns. The company has detected the compromise through its website malware monitoring platform HackAlert, …
5 data-stealing apps offered on Android Market
Nearly a month ago, researchers have discovered a Chinese mobile phone monitoring service that allows users to compromise a target’s mobile phone running Symbian or …
Email marketing companies web accounts sending out malicious spam
The breach of the Atlanta-based Silverpop Systems back in December 2010 has resulted in the compromise of (some confirmed, some not) corporate mailing lists of over 100 big …
New Mac Trojan copies successful Windows Trojan technique
Windows users have been warned time and time again of malware hiding behind icons and extensions belonging to files associated with legitimate software – most notably …
Over 300 cyberspy attacks against Russian targets discovered
Trend Micro researchers have discovered that 1465 computers belonging to 47 distinct political and economical entities in 61 different (mostly former Soviet Union) countries …
Fake stores dominant threat due to blackhat SEO
“Searches for buying software online remains 90 percent malicious, redirecting users to fake stores,” concluded Julian Sobrier recently, after having analyzed the …
A botnet for the masses
Did you know that you can buy a bot for just 10 Euros? Researchers of German security firm G Data have discovered that a bot builder dubbed “Aldi Bot” is currently …
Featured news
Resources
Don't miss
- Data-stealing VS Code extensions removed from official Marketplace
- Flawed WordPress theme may allow admin account takeover on 22,000+ sites (CVE-2025-4322)
- What good threat intelligence looks like in practice
- AutoPatchBench: Meta’s new way to test AI bug fixing tools
- Third-party cyber risks and what you can do