Hackers Turn to Microsoft’s LinkedIn to Infect Users’ Devices

Hackers Turn to Microsoft’s LinkedIn to Infect Users’ Devices

Complex campaign relying on fake LinkedIn job offers

  • Windows
  • By Bogdan Popa
  • February 17th, 2019
Malicious Windows 10 Apps Found in the Store, Possibly Downloaded by Thousands

Malicious Windows 10 Apps Found in the Store, Possibly Downloaded by Thousands

Coin miners discovered in eight different applications

Google Says It Scans 50 Billion Android Apps Every Day to Detect Malware

Google Says It Scans 50 Billion Android Apps Every Day to Detect Malware

Firm shares new data on security efforts on Android

  • Windows
  • By Bogdan Popa
  • February 13th, 2019
Windows Malware Infects macOS with Malicious Executable File

Windows Malware Infects macOS with Malicious Executable File

EXE files more dangerous on Macs than on Windows

  • Linux
  • By Bogdan Popa
  • February 12th, 2019
Good Guy Malware: Linux Virus Removes Other Infections to Mine on Its Own

Good Guy Malware: Linux Virus Removes Other Infections to Mine on Its Own

Linux systems targeted by a new type of malware

Best Windows 10 Security Products to Clean an Infected Computer

Best Windows 10 Security Products to Clean an Infected Computer

Research evaluates malware removal capabilities

Infected Apps in the Google Play Store Turn Android Phones into Porn Hubs

Infected Apps in the Google Play Store Turn Android Phones into Porn Hubs

Security company warns of malicious apps in the store

  • Linux
  • By Bogdan Popa
  • January 21st, 2019
Linux Virus Removes Security Software to Mine Monero

Linux Virus Removes Security Software to Mine Monero

Malware found to target five Linux security products

Best Security Apps for Android (November 2018)

Best Security Apps for Android (November 2018)

Research puts Android antivirus apps to test

Microsoft Wants Malware to Be Blocked Before It Does Any Damage

Microsoft Wants Malware to Be Blocked Before It Does Any Damage

Competition launched to test AI implementations

Operation Sharpshooter Uses Fileless Malware to Attack Global Infrastructure

Operation Sharpshooter Uses Fileless Malware to Attack Global Infrastructure

Actor uses recruiting lure for collection and exfiltration

Campaign Drops Coinminer on Linux Boxes Using Old Elasticsearch Vulnerabilities

Campaign Drops Coinminer on Linux Boxes Using Old Elasticsearch Vulnerabilities

Actors pivot to other network devices from infected machines

PayPal's Customers Most Targeted by Phishing Campaigns During 2018, Says Report

PayPal's Customers Most Targeted by Phishing Campaigns During 2018, Says Report

60% of phishing emails contain malicious attachments

Crooks Use Spoofed Critical Russian Infrastructure Domains to Mimic State APT

Crooks Use Spoofed Critical Russian Infrastructure Domains to Mimic State APT

RedControle backdoor chosen as the group's weapon of choice

Health and Retail Sectors Targeted by CapitalInstall Malware Campaign

Health and Retail Sectors Targeted by CapitalInstall Malware Campaign

Payload dropped via Azure hosted drive-by-download links

Novidade Exploit Kit Actively Targeting SOHO and Home Routers

Novidade Exploit Kit Actively Targeting SOHO and Home Routers

Malware campaign uses CSRF to change routers' DNS settings

ESET Unearths Android Trojan That Steals Funds from 2FA-Secured PayPal Accounts

ESET Unearths Android Trojan That Steals Funds from 2FA-Secured PayPal Accounts

The Android malware can steal funds in under 5 seconds

 
Want more? Browse: