Trojans Installed on Computers of Poker Players Give the Attackers an Edge

F-Secure experts provide a perfect example of what's called a Sharking attack
by Eduard Kovacs, December 11th, 2013
MouaBad Malware Allows Cybercriminals to Make Phone Calls

MouaBad Malware Allows Cybercriminals to Make Phone Calls

by Eduard Kovacs, December 10th, 2013
Lookout researchers have analyzed the interesting threat
 

Researchers Show How Malware Can Transmit Data via Audio Signals

A POC malware can jump 20 meter (65 feet) air gaps at a time
by Eduard Kovacs, December 3rd, 2013
Linux Worm Darlloz Targets Routers, Security Cameras and Set-Top Boxes

Linux Worm Darlloz Targets Routers, Security Cameras and Set-Top Boxes

by Eduard Kovacs, November 27th, 2013
Symantec researchers say they haven't spotted attacks in the wild
 

Experts Warn of New Banking Trojan Neverquest

The threat is capable of targeting the customers of numerous organizations
by Eduard Kovacs, November 26th, 2013
 

Decrypting Files Encrypted by CryptoLocker Now Costs 0.5 Bitcoins

Bitdefender has released a small tool that prevents the ransomware from encrypting files
by Eduard Kovacs, November 22nd, 2013
 
Want more? Browse: