Please turn on your JavaScript for this page to function normally.
Spammers switch to compromised accounts, shift away from botnets

Spammers today favor compromised accounts for sending spam, gradually shifting distribution away from botnets, according to Commtouch. The changed tactic has emerged as spam …

MS Security Center search results poisoned

You would think that the Microsoft Safety and Security Center is the one place where you would be safe from malicious links, and you would be wrong. According to GFI’s …

An examination of malware ecosystems

Malware delivery networks are typically hosted across multiple sites and are responsible for launching dynamic attacks on unsuspecting users. A new Blue Coat report examines …

Law enforcement winning the battle against cybercrime

June was a difficult time for cybercriminals as it saw some notable successes for various law enforcement agencies in the war on cybercrime, according to Kaspersky Lab’s …

Highlights of recent phishing attacks

GFI Software announced the top 10 most prevalent malware threats for June 2011. Highlights for the month included continued phishing attacks, notably one affecting …

The malware behind an “indestructible” botnet

It took only three months for the TDL rootkit – also known as Tidserv, TDSS and Alureon – to add over 4,5 million infected computers to the developers’ …

Hiloti Trojan downloader infection rates triple in UK

The Hiloti generic downloader is a Trojan first seen in December 2008 has shown a dramatic increase in infection rates of PCs during June 2011. Hiloti is a generic malware …

“Credit card overdue” spam carries malware

Spam emails seemingly coming from a credit card company have been hitting inboxes and trying to scare users into downloading and running the attached malicious file: According …

Russia becomes world leader for malware

The volume of spam in email traffic increased 2.1 per cent in May, when compared with the previous month, making up on average 80.8 per cent of the total. A reduction of …

Bitcoin-mining Trojan spotted

Bitcoin has received lately a lot of attention from users and from the media, so it’s no wonder that cyber criminals have also figured out ways to take advantage of its …

Solution for Popureb rootkit infection

Bootkits are kernel-mode rootkit variants that hide in the computer’s master boot record (MBR) and are notoriously difficult to spot and, sometimes, to eradicate. …

Federal Reserve spam campaign leads to malware

A rather poorly executed but extensive spam campaign impersonating the US Federal Reserve is currently targeting online banking users. The email, using graphics hosted by the …

Don't miss

Cybersecurity news