USB autorun attacks against Linux
Many people think that Linux is immune to the type of Autorun attacks that have plagued Windows systems with malware over the years. However, there have been many advances in …
Zeus Trojan targets UK government
During his speech at the Munich Security Conference on Friday, UK’s foreign secretary William Hague revealed that the UK government has been targeted with a e-mail …
GFI Software brings Deep Freeze technology to Sandbox customers
GFI Software announced an expansion of its technology partnership with Faronics in which Faronics Deep Freeze will be bundled with its GFI Sandbox technology. GFI Sandbox …
Targeted attacks on Abobe Reader files rise
GFI Software revealed continuing high levels of rogue security products circulating during January, and a surge in malware that takes aim at vulnerabilities within Adobe …
Cybercriminals target Super Sunday as their biggest game ever
Security experts predict record-breaking numbers of online threats and cyber attacks related to Super Sunday as compared to other holidays or events. According to …
Zeus evolution: Geographical attack locations
Despite having been around for four years, Zeus continues to be a thorn in the side of the IT security industry and its business users, mainly because of its constantly …
500,000 stolen e-mail credentials for Waledac’s comeback
Almost a year ago, the Waledac botnet was crippled by a legal action initiated by Microsoft which resulted in the takedown of 273 Internet domains that were being used as …
Serious jump in new vulnerabilities exploitation
On a typical month, exploit activity falls between 30 percent and 40 percent, according to Fortinet. Half of new vulnerabilities rated as “critical” were targeted …
Panda Antivirus for Mac Corporate Edition released
Panda Security launched Antivirus for Mac Corporate Edition, a solution for companies operating with hybrid computing environments, delivering complete protection against all …
Expanding phishing vector: Classified ads
The online classified advertisement services sector has been increasingly exploited as a phishing attack vector by ecrime gangs, a trend confirmed by the growth of attacks …
Rogueware starts misusing names of legitimate AV
Rogueware authors have so far mostly avoided misusing names of legitimate AV software, and I often wondered why. My best guess is that they wanted to minimize the possibility …
Widespread “undelivered package” spam attack delivers Trojans
Cybercriminals are currently sending out the spam messages – which come attached with a malware infected .zip file – with titles such as “Post Express …
Don't miss
- Why cloud vulnerabilities need CVEs
- Making cybersecurity more appealing to women, closing the skills gap
- Building a strong cloud security posture
- Palo Alto firewalls: CVE-2024-3400 exploitation and PoCs for persistence after resets/upgrades
- Triangulation fraud: The costly scam hitting online retailers