Author of potentially malicious OS X Pirrit adware discovered
An unnamed web developer working for Israeli marketing and advertising company TargetingEdge is the creator of the Pirrit adware targeting Mac machines, Cybereason security …
New Mac OS X backdoor disguised as document converter app
Bitdefender researchers have discovered and analyzed a new, highly dangerous piece of malware targeting Mac systems and users. The malware, dubbed “Eleanor,” opens …
The many faces of ransomware
Ransomware has grabbed mainstream media attention recently but it’s nothing new – in fact, its origins can be traced back to floppy disk times. Part of ransomware’s new found …
Locky ransomware variant Zepto hits users via email
A new version of Locky ransomware that has been dubbed “Zepto” due to the .zepto extension added to encrypted files is successfully extorting users around the …
How online learning algorithms can help improve Android malware detection
A group of researchers from Nanyang Technological University, Singapore, have created a novel solution for large-scale Android malware detection. It’s called DroidOL, …
Rooting Hummer malware brings $500,000 per day to its creator
Android malware with device rooting capabilities has been hitting Google Play for a while now, but for users third-party app stores the situation is even more dangerous. The …
How many businesses will pay a ransom if attacked?
Some 84 percent of information technology executives at firms that had not faced ransom attacks said they would never pay a ransom. But among firms that had been attacked, 43 …
Android-rooting malware lurking on Google Play
For a while now Android-rooting malware has been creeping in Google’s Play store. The latest instance, discovered by Lookout researchers, masquerades as LevelDropper, an …
UK banking customers targeted with Retefe Trojan with MitM capabilities
UK users are the latest targets of cyber crooks leveraging the Retefe banking Trojan and a rogue root certificate. The malware is out to steal online banking credentials of …
NASCAR team falls victim to ransomware, pays ransom
Most US businesses would perhaps not pay in the event of a ransomware attack, but Circle-Sport Leavine Family Racing (CSLFR), a professional NASCAR car racing team, is not one …
6 tips to prevent ransomware attacks
Hospital extortions, ransomware for Macs, and more – 2016 appears to be the year of ransomware. This malicious software allows attackers to access your computer, encrypt …
Exfiltrating data from air-gapped computers by modulating fan speed
For the last few years, researchers from Ben-Gurion University of the Negev have been testing up new ways to exfiltrate data from air-gapped computers: via mobile phones, …
Featured news
Resources
Don't miss
- Critical Control Web Panel vulnerability is actively exploited (CVE-2025-48703)
- 18 arrested in €300 million global credit card fraud scheme
- PortGPT: How researchers taught an AI to backport security patches automatically
- AI can flag the risk, but only humans can close the loop
- VulnRisk: Open-source vulnerability risk assessment platform