Beware of malicious “Windows 9 free download” offers
The developer preview release of Windows 9 is scheduled to be publicly available this September, and cyber crooks have already started peddling bogus versions of the announced …
Researchers warn about schemes that lead to FlashPack exploit kit
Security researchers have spotted two different online schemes that lead to pages hosting the FlashPack exploit kit. The first one relies on users visiting a compromised …
Bitcoin-themed phishing campaign creates quite a stir
The latest massive email phishing campaign targeting Bitcoin users has had an unexpected click-through rate. The spam campaign came in two waves, and of the 12,000 messages …
Crooks trying out new tactics to spread fake AV
Infection numbers of well-established fake AV families have reached the lowest level in years, and Microsoft researchers believe the drop is the result of the antimalware …
Android ransomware masquerades as Symantec mobile AV
A new piece of Android ransomware is doing rounds, and is tricking users into installing it by posing as a legitimate AV app. The malware sports a logo similar to that of …
ZeroLocker ransomware “helps” you get your files back
In early June, the FBI has lead a rather successful multi-national effort to disrupt the GameOver Zeus botnet which was also responsible for delivering Cryptolocker. …
Fake Tor Project website delivers malware instead of anonymity
A computer science student has discovered an almost perfect copy of The Tor Project’s website, offering malware for download instead of the Tor Browser Bundle and …
“Facebook color changer” app leads to malware, account hijacking
The change-your-Facebook-color scam is once again targeting inexperienced users of the social network, and they are once again falling for it. According to researchers from …
Top 10 Facebook scams
American singer and actress Taylor Swift has lost her scam mojo, as her fake sex tape spreading on Facebook was excluded from the top ten most successful scams, according to …
Android Fake ID bug allows malware to impersonate trusted apps
The Bluebox Security research team has unearthed another critical Android vulnerability. Named “Fake ID,” the security bug can be used by malicious applications to …
Facebook scams now lead to exploit kits
The Facebook scam is a familiar phenomenon to every user of the popular social network, and most of them have fallen for it at one time or another as it only takes a moment of …
The psychology of phishing
Phishing emails are without a doubt one of the biggest security issues consumers and businesses face today. Cybercriminals no longer send out thousands of emails at random …
Featured news
Resources
Don't miss
- Why your security team feels stuck
- It’s time to give AI security its own playbook and the people to run it
- Kanvas: Open-source incident response case management tool
- 6 eye-opening books on AI’s rise, risks, and realities
- Check for CitrixBleed 2 exploitation even if you patched quickly! (CVE-2025-5777)