Spam rate increases, growth expected to continue
Compared to the previous month, the amount of spam in email traffic increased by 1.2 per cent and averaged 80.8 per cent, according to Kaspersky Lab’s most recent …
The resurrection of the Mariposa botnet
When the news that the Spanish police arrested the three individuals suspected of running the Mariposa botnet was made public back in March 2010, it was generally thought that …
New Mac Defender variant doesn’t need your admin password
There is a new variant of the Mac Defender rogue AV out there, and this one doesn’t require users to enter the administrator password in order to install the program, …
Apple acknowledges Mac Defender existence, gives removal instructions
It took a while for Apple to react properly to the onslaught of Mac Defender and similar fake AV aimed at Mac users, but they finally did it. Only days after the revelation of …
Fake VirusTotal site serves malware
VirusTotal – the popular free file checking website – has been spoofed by malware peddlers, warns Kaspersky Lab. A simple visit to the site triggers the download …
iPhone 5 spam run leads to malware
The date of the release of iPhone 5 is still unknown, but that doesn’t stop malware peddlers from using it to lure in Apple fanatics. After all, didn’t a recent …
The progress of IT threats in 2010
Cyber criminals have capitalized on the recent growth in popularity of the Android mobile platform. Based on the number of new mobile malware signatures detected during this …
Mac Protector: Fake AV targets Mac OS X users
A little over two weeks have passed since the appearance of MAC Defender, the fake AV solution targeting Mac users. And seeing that the approach had considerable success, it …
SpyEye Trojan attacks Verizon’s online payment page
Trusteer discovered a configuration of the SpyEye Trojan targeting Verizon’s online payment page and attempting to steal payment card information. The attack took place …
New Alureon variant improves on old evasion techniques
The Alureon Trojan (also known as TDL, TDSS and Tidserv) has been around since 2007, and it’s function consist mainly in allowing the attacker to intercept incoming and …
Trojan paves way for rogue defragmenter
You might have heard about rogue AV solutions and scareware, but not many people have experienced a rogue defragmenter that hides files and (indirectly) asks money to return …
Wikipedia-like sites peddling fake pharmaceuticals
Wikipedia is practically a household name now, so it’s no wonder that spammers are trying to take advantage of the online encyclopedia’s popularity and (relative) …
Featured news
Resources
Don't miss
- Attackers use “Contact Us” forms and fake NDAs to phish industrial manufacturing firms
- New framework aims to outsmart malware evasion tricks
- Finding connection and resilience as a CISO
- AI isn’t taking over the world, but here’s what you should worry about
- Agentic AI coding assistant helped attacker breach, extort 17 distinct organizations