Please turn on your JavaScript for this page to function normally.
Cybercriminals shifting focus to non-Windows systems

In a major cybercrime turning point, scammers have begun shifting their focus away from Windows-based PCs to other operating systems and platforms, including smart phones, …

Zeus malware now targets online payment providers

The Zeus malware continues to evolve, diversifying away from its target bank sites and their customers, and over to sites with user credentials that allow assets that have a …

Fake Facebook password change notification leads to malware

The following e-mail purportedly sent by Facebook has recently been hitting inboxes around the world: The attached .zip file that supposedly contains the new password actually …

A global shift in cybercrime

The target of attacks has shifted from traditional infrastructure to mobile users and endpoint devices, according to a new report. Research from SpiderLabs found that …

Chinese Trojan targets cloud-based AV technologies

A Trojan that tries to obstruct cloud-based antivirus technology present in major AV solutions offered by Chinese security firms is targeting users by posing as a video player …

“Free iPhone and iPad combo” offer lures Twitterers to malicious site

A surge in malicious shortened links accompanying messages that say I just won a free iphone and ipad! (or a variation of that message) has been spotted on yesterday morning …

Bizarre Firefox update scam offers AV to go with it

A fascinating mishmash of scammy offers is currently being pushed onto Russian-speaking users on chatrooms, forums and security lists. It all starts with a link that takes …

Dramatic increase in malware and phishing via social networks

By mid-2010, Facebook recorded half a billion active users, making it not only the largest social networking site, but also one of the most popular destinations on the web. …

ICQ’s critical flaw allows attackers to serve malicious software update

ICQ – the popular instant messaging application – has a gaping security hole that can allow attackers to execute malicious code on the targeted system, says …

Vulnerabilities in the Boonana Trojan increase the danger

First spotted almost three months ago, the Boonana Trojan stood out because of its capability to infect both computer running Windows and those running Mac OS X. The Trojan …

Banking Trojan incorporates legitimate remote control software

It seems that every technology made for “good” can be misused, and that also goes for software, apparently. An ESET researcher has recently received a sample of …

Toolkit merging Zeus and SpyEye already on the market?

When the alleged Zeus-SpyEye merger became news last October, a lot of people wondered what new capabilities we could expect of this new toolkit. According to McAfee’s …

Don't miss

Cybersecurity news