Bitcoin mining botnet also used for DDoS attacks
A recently discovered P2P Bitcoin mining botnet has acquired DDoS capabilities, warns Kaspersky Lab expert Tillmann Werner. It’s main reason of existence has so far been …
Zeus rival boasts of eluding tracker services, fails
Kaspersky Lab expert Jorge Mieres wrote yesterday about Ice IX – the first crimeware based on the leaked Zeus source code. “Ice IX Botnet is the first new …
Bogus emails delivering scanned documents carry malware
Emails posing as scanned documents sent from a Xerox WorkCentre Pro photocopier are again being sent out by malware peddlers, warns Sophos. This is not the first time that …
Install one Trojan, get three more
Downloader Trojans are often used by cyber crooks to thoroughly infect systems in order to extract anything that might be of value to them. Trojan.Badlib is a particularly …
Fake Facebook friend request email leads to malware
Facebook users are once again being targeted with fake emails purportedly coming from the social network, alerting them to a friend request. A click on the offered …
Malware targeting Android jumps 76 percent
The amount of malware targeted at Android devices jumped 76 percent since last quarter, to become the most attacked mobile operating system, according to McAfee. 2011 has also …
Ramnit worm uses Zeus Trojan tactics for banking fraud
Trusteer discovered the 18 month old file infecting worm Win32.Ramnit has morphed into financial malware and is actively attacking banks to commit online fraud. Ramnit …
Chinese mobile phone monitoring service found
What do you think cyber crooks do with the information collected from mobile phones by malware? Trend Micro has one of the answers to that question. Its researchers have …
Trojanized Android app intercepts messages to hide costly subscriptions
Another trojanized Android app that monitors received text messages for keywords has been uncovered by Trend Micro, and this time, the feature is not used for spying but to …
Emerging threats: Attacks via MIPS devices
First of all, if something has already been invented and has been seen in-the-wild more than once, it’s very likely to occur again and again, especially if the attacks …
Keeping abreast of Web malware delivery techniques
One of the crucial things that Google must do to keep making Internet users use its search engine is to keep an eye on the many ways that cyber criminals employ to spread …
“Uniform traffic ticket” spam leads to malware
A massive spam campaign taking the form of an email notifying the recipients of a bogus traffic ticket has been detected by a number of security companies. The email in …
Featured news
Resources
Don't miss
- Apple offers $2 million for zero-click exploit chains
- Attackers are exploiting Gladinet CentreStack, Triofox vulnerability with no patch (CVE-2025-11371)
- October 2025 Patch Tuesday forecast: The end of a decade with Microsoft
- From theory to training: Lessons in making NICE usable
- Securing agentic AI with intent-based permissions