•  
  • By Catalin Cimpanu
  • January 26th, 2016
This Malicious Chrome Extension Is the Most Annoying Thing You'll See All Week

This Malicious Chrome Extension Is the Most Annoying Thing You'll See All Week

Chrome extension pesters you to install it and then spies on your browsing history, sending it to a remote server

  •  
  • By Catalin Cimpanu
  • January 19th, 2016
New Trojan Spies on Linux Users by Taking Screenshots and Recording Audio

New Trojan Spies on Linux Users by Taking Screenshots and Recording Audio

Only the screengrab function is active in the first version

  •  
  • By Catalin Cimpanu
  • January 10th, 2016
Spymel Info-Stealing Trojan Evades Antivirus Detection via Stolen Certificates

Spymel Info-Stealing Trojan Evades Antivirus Detection via Stolen Certificates

Zscaler researchers discover yet another malware family hiding with the help of stolen digital certificates

  •  
  • By Catalin Cimpanu
  • December 28th, 2015
Android Malware Uses Built-in Firewall to Block Security Apps

Android Malware Uses Built-in Firewall to Block Security Apps

Malware authors employ open-source Android firewall utility to block security app from talking to their cloud servers

  •  
  • By Catalin Cimpanu
  • December 21st, 2015
Cybercrime Group Uses Christmas-Themed Apps to Spy On Targets

Cybercrime Group Uses Christmas-Themed Apps to Spy On Targets

Group develops and employs both desktop and mobile spyware

  •  
  • By Catalin Cimpanu
  • December 10th, 2015
Fake Steam Trading Websites Distribute Backdoors

Fake Steam Trading Websites Distribute Backdoors

Cyber-crooks promise quicker trades but deliver malware

  •  
  • By Catalin Cimpanu
  • November 24th, 2015
GlassRAT Remote Access Trojan Detected Spying on Chinese Businessmen

GlassRAT Remote Access Trojan Detected Spying on Chinese Businessmen

GlassRAT spyware goes undetected for three years

  •  
  • By Catalin Cimpanu
  • November 10th, 2015
Egyptian Hacker Creates KillerRat Spying Tool Out of the Ashes of njRAT

Egyptian Hacker Creates KillerRat Spying Tool Out of the Ashes of njRAT

New KillerRat RAT gives attackers full control over victims

  •  
  • By Catalin Cimpanu
  • October 27th, 2015
WhatsApp Collects Information on Phone Numbers, Call Duration

WhatsApp Collects Information on Phone Numbers, Call Duration

Data is sent for storage on WhatsApp's servers

  •  
  • By Catalin Cimpanu
  • October 24th, 2015
Download Manager (S3) Firefox Add-On Spies on Users <em>UPDATE</em>

Download Manager (S3) Firefox Add-On Spies on Users UPDATE

Firefox Download Manager (S3) add-on captures the entire source code of Web pages and uploads them to a remote server

  •  
  • By Catalin Cimpanu
  • October 18th, 2015
FinFisher Spyware Becomes More Popular Among Government Agencies

FinFisher Spyware Becomes More Popular Among Government Agencies

The number of countries deploying it grows to 32

  •  
  • By Catalin Cimpanu
  • October 1st, 2015
FBI Uses Spyware to Catch Tor-Based Child Pornography Suspect

FBI Uses Spyware to Catch Tor-Based Child Pornography Suspect

They call it NIT, everyone else calls it spyware

  •  
  • By Catalin Cimpanu
  • September 25th, 2015
Lenovo Laptops and Computers Come with Pre-Installed Spyware

Lenovo Laptops and Computers Come with Pre-Installed Spyware

Lenovo collects data on its users' daily activities

  •  
  • By Ionut Ilascu
  • November 11th, 2014
Darkhotel Espionage Group Targets Executives Staying at Luxury Locations

Darkhotel Espionage Group Targets Executives Staying at Luxury Locations

The group relies on highly advanced zero-day exploits

  •  
  • By Ionut Ilascu
  • October 1st, 2014
Advanced Android Remote Access Trojan Aimed at Hong Kong Protesters

Advanced Android Remote Access Trojan Aimed at Hong Kong Protesters

Operators offer malicious app claiming to be from Code4HK

  •  
  • By Ionut Ilascu
  • June 11th, 2014
Air-Gapped Networks Can Be Hacked from Afar

Air-Gapped Networks Can Be Hacked from Afar

Ben Gurion University security researchers demonstrate the attack

  •  
  • By Eduard Kovacs
  • March 12th, 2014
The NSA Uses Automated Tools to Plant Malware on Millions of Computers

The NSA Uses Automated Tools to Plant Malware on Millions of Computers

The latest Edward Snowden leaks show the NSA can exploit computers on an industrial scale

 
Want more? Browse: