- By Catalin Cimpanu
- January 26th, 2016
This Malicious Chrome Extension Is the Most Annoying Thing You'll See All Week
Chrome extension pesters you to install it and then spies on your browsing history, sending it to a remote server
- By Catalin Cimpanu
- January 19th, 2016
New Trojan Spies on Linux Users by Taking Screenshots and Recording Audio
Only the screengrab function is active in the first version
- By Catalin Cimpanu
- January 10th, 2016
Spymel Info-Stealing Trojan Evades Antivirus Detection via Stolen Certificates
Zscaler researchers discover yet another malware family hiding with the help of stolen digital certificates
- By Catalin Cimpanu
- December 28th, 2015
Android Malware Uses Built-in Firewall to Block Security Apps
Malware authors employ open-source Android firewall utility to block security app from talking to their cloud servers
- By Catalin Cimpanu
- December 21st, 2015
Cybercrime Group Uses Christmas-Themed Apps to Spy On Targets
Group develops and employs both desktop and mobile spyware
- By Catalin Cimpanu
- December 10th, 2015
Fake Steam Trading Websites Distribute Backdoors
Cyber-crooks promise quicker trades but deliver malware
- By Catalin Cimpanu
- November 24th, 2015
GlassRAT Remote Access Trojan Detected Spying on Chinese Businessmen
GlassRAT spyware goes undetected for three years
- By Catalin Cimpanu
- November 10th, 2015
Egyptian Hacker Creates KillerRat Spying Tool Out of the Ashes of njRAT
New KillerRat RAT gives attackers full control over victims
- By Catalin Cimpanu
- October 27th, 2015
WhatsApp Collects Information on Phone Numbers, Call Duration
Data is sent for storage on WhatsApp's servers
- By Catalin Cimpanu
- October 24th, 2015
Download Manager (S3) Firefox Add-On Spies on Users UPDATE
Firefox Download Manager (S3) add-on captures the entire source code of Web pages and uploads them to a remote server
- By Catalin Cimpanu
- October 18th, 2015
FinFisher Spyware Becomes More Popular Among Government Agencies
The number of countries deploying it grows to 32
- By Catalin Cimpanu
- October 1st, 2015
FBI Uses Spyware to Catch Tor-Based Child Pornography Suspect
They call it NIT, everyone else calls it spyware
- By Catalin Cimpanu
- September 25th, 2015
Lenovo Laptops and Computers Come with Pre-Installed Spyware
Lenovo collects data on its users' daily activities
- By Ionut Ilascu
- November 11th, 2014
Darkhotel Espionage Group Targets Executives Staying at Luxury Locations
The group relies on highly advanced zero-day exploits
- By Ionut Ilascu
- October 1st, 2014
Advanced Android Remote Access Trojan Aimed at Hong Kong Protesters
Operators offer malicious app claiming to be from Code4HK
- By Ionut Ilascu
- June 11th, 2014
Air-Gapped Networks Can Be Hacked from Afar
Ben Gurion University security researchers demonstrate the attack
- By Eduard Kovacs
- March 12th, 2014
The NSA Uses Automated Tools to Plant Malware on Millions of Computers
The latest Edward Snowden leaks show the NSA can exploit computers on an industrial scale