Please turn on your JavaScript for this page to function normally.
Trend Micro expands risk management portfolio

Trend Micro announced new solutions for protecting enterprises from Advanced Persistent Threats (APT) known to evade conventional perimeter and content security. Today’s …

History and future of mobile malware

Panda Security released a report on the history, current state and future of mobile malware which aims to raise awareness of the threats affecting mobile devices as well as …

Malware writers rely on users not updating

When infecting PCs, online criminals are increasingly benefiting from uninstalled updates for browsers and their components. Research carried out by G Data SecurityLabs …

Continued attacks on social networks

GFI Software announced the top 10 most prevalent malware threats for the month of May 2011. The month was marked by a number of Facebook survey scams baiting users with offers …

Plankton Android Trojan found in 10 apps on Android Market

Ten more applications have been pulled from the Google’s official Android Market following a notification that they contained a new kind of Android malware. The malware …

Trends in the badware landscape

Badware is a defining challenge for individuals, businesses, and governments throughout the world. Cybercriminals have developed a mature badware economy in which individual …

Fake LinkedIn notifications lead to malware

Malware peddlers are targeting LinkedIn users with rather legitimate-looking messages supposedly coming from the social networking site: If the look of the message seems …

Financial data stealing malware on the Amazon cloud

There were some recent comments about Amazon Cloud as a platform for successful attacks on Sony. Now Amazon Web Services (cloud) now are being used to spread financial data …

Fake AV distributed via user profiles on popular sites

An investigation into the methods of distibution of the FakeRean familiy of fake AVs has revealed some interesting facts, says GFI. In order to lure people into downloading …

Stolen passwords used as bait in malware spam run

At the rate at which databases of various online services are currently being compromised, I expect that emails such as this latest one spotted by Symantec will become a …

Apple security update bypassed after 8 hours

It took only eight hours for the malware developers behind the MacDefender and its variants to come up with a way to bypass the security update pushed out by Apple. According …

Auto-dialing Trojans migrate to Android devices

Auto-dialing malware has migrated from Symbian devices to Android ones, warns NetQin Mobile researchers. The Trojan has been spotted embedded in over 20 Android applications …

Don't miss

Cybersecurity news