Please turn on your JavaScript for this page to function normally.
New techniques for detecting hardware Trojans

Most Internet users know about the existence of software Trojans, but that of hardware ones is less known. They consist of integrated circuits that have been modified by …

Hybrid social engineering attacks

Fraudulent phone calls are increasing in popularity. One possible use for these bogus “bank’ calls is to utilize personal identification information stolen using …

Five million new malware samples

In the third quarter of 2011 alone, five million new malware samples were created. In addition, Trojans set a record for becoming the preferred category for cybercriminals to …

Cybercriminal gang ringleaders convicted for stealing over $4.5 million

Two Ukrainians who admitted to have been the ringleaders of a criminal ring bent on stealing money from online bank accounts have finally been sentenced to four years and …

Multitasking DevilRobber Trojan targets Mac OS X users

Another week, another Mac OS X Trojan spotted. Both Sophos and Intego have detected a Bitcoin-mining Trojan that also opens a backdoor into the infected system and steals …

Duqu not developed by Stuxnet author

The Dell SecureWorks Counter Threat Unit (CTU) research team has been analyzing the Duqu trojan which received a great deal of attention because it is similar to the infamous …

Fake DHL delivery notification carries info-stealer Trojan

Malware peddlers have once again started a spam run that consists of emails purportedly sent by DHL. They spoofed the sender information, making it look like the email was …

Naked Emma Watson video leads to malware

Fake videos or pictures of naked international celebrities are often used as lures in schemes to propagate malware. The latest of these videos purportedly features popular …

Japanese Parliament’s computers infected, data stolen

As the investigation into the breach of Mitsubishi Heavy Industries’ networks discovered last month continues, internal sources have confirmed that sensitive and …

Federal Trojan has more capabilities than previously thought

Ten days ago, the Chaos Computer Club made public a set of worrisome discoveries made by their analysis of the “lawful interception” Trojan used by German law …

Mac Trojan disrupts automatic updating of XProtect

A variant of the recently discovered Flashback Trojan for Mac OS X has acquired the capability to disrupt the automatic updating of XProtect, the operating system’s …

How the German “Federal Trojan” was actually used

After the Chaos Computer Club hackers made public the results of their analysis of a few samples of the so-called “Federal Trojan” and found it capable of more …

Don't miss

Cybersecurity news