Spam about the Jasmine Revolution leads to malware
By the end of 2010, the total number of Chinese Internet users reached 457 million. That means that even if scammers and hackers concentrate exclusively on that particular …
By the end of 2010, the total number of Chinese Internet users reached 457 million. That means that even if scammers and hackers concentrate exclusively on that particular …
The Connecticut-based Hartford Financial Services Group – a Fortune 100 company and one of the largest investment and insurance companies in the US – has suffered …
A new bootkit – kernel-mode rootkit variant – has been recently spotted by a Kaspersky Lab researchers, and it looks like is currently targeting only Chinese …
The customers of a European bank have recently been targeted by a man-in-the-mobile attack featuring a SpyEye variant. “The bank uses SMS based mTANs to authorize …
Barely two months after cybercriminals put the source code of Zeus up for sale at $100,000, reports are now coming in that the source code is being offered at bargain basement …
A new Android Trojan is up an about, and can be find on several of the most popular file sharing sites in the US and Asia. Disguised as a non-existent version of the …
In a what should actually not be a wholly unexpected turn of events, the Android Market security update – pushed to Android users whose devices where affected by one or …
The last version of the Zeus builder before author Monstr/Slavik gave up its source code to the author of the SpyEye toolkit is 2.0.8.9, and it’s still being offered on …
Norman researchers identified an emerging variant of the SpyEye Trojan that targets specific online banking applications. SpyEye is a malware toolkit that has become …
Malware authors have begun to set their sights on mobile device users, as witnessed by the latest Trojans made for Android-running devices, on official and unofficial online …
After last week’s discovery of some 50+ malicious applications on the official Android Marketplace, Google has removed them as soon as they became aware of their …
Continuing a trend observed since last summer, the same types of Trojan horse programs have persistently dominated the threat landscape through February, according to GFI …