Trend Micro Publishes Research Paper on Russian Cybercrime Underground

Trend Micro Publishes Research Paper on Russian Cybercrime Underground

The new paper is an update to a report published back in 2012

Phishers Abuse Microsoft Azure to Target PayPal, Apple, and Visa Customers

Phishers Abuse Microsoft Azure to Target PayPal, Apple, and Visa Customers

Experts say the cybercriminals are relying on the free 30-day trial

How to Protect Yourself from Internet Explorer Vulnerability

How to Protect Yourself from Internet Explorer Vulnerability

There are ways to make sure you're not going to fall prey to hackers

Browlock Ransomware Targets Russian Users, Experts Warn

Browlock Ransomware Targets Russian Users, Experts Warn

It’s not difficult to get rid of the browser locker

XSS Vulnerability in Sohu.com Leveraged for Large-Scale DDOS Attacks

XSS Vulnerability in Sohu.com Leveraged for Large-Scale DDOS Attacks

Cybercriminals have found a clever way to launch attacks

Operation Clandestine Fox: Zero-Day Affecting IE 6 Through 11 Used in Targeted Attacks

Operation Clandestine Fox: Zero-Day Affecting IE 6 Through 11 Used in Targeted Attacks

FireEye researchers have been analyzing the attacks

Images, Doodles, Videos and Location Data Sent via Viber Are Not Encrypted

Images, Doodles, Videos and Location Data Sent via Viber Are Not Encrypted

Researchers from the University of New Haven have analyzed the IM application

Spammers Use Non-Latin Characters to Evade Spam Filters

Spammers Use Non-Latin Characters to Evade Spam Filters

Kaspersky experts have spotted this trend in some spam runs targeting Italian users

Cybercriminals Behind Operation Francophoned Start Using New Payload

Cybercriminals Behind Operation Francophoned Start Using New Payload

The attackers seem to be determined to improve their “business”

SMS Trojan FakeInst Targets Users in 66 Countries

SMS Trojan FakeInst Targets Users in 66 Countries

Experts from Kaspersky have been monitoring the threat since February 2013

Amazon and HP Cloud Services Vulnerable Due to Unpatched Windows Server Installations

Amazon and HP Cloud Services Vulnerable Due to Unpatched Windows Server Installations

Security researchers from Bkav are the ones who identified the security issues

South Korea Ferry Incident Leveraged in Malware Distribution Campaign

South Korea Ferry Incident Leveraged in Malware Distribution Campaign

Trend Micro experts say the malicious emails started going out hours after the news broke

Various Vulnerabilities Found on Yahoo Taiwan’s Fashion Subdomain – Video

Various Vulnerabilities Found on Yahoo Taiwan’s Fashion Subdomain – Video

The security holes are out-of-scope for the bug bounty program

Cybercriminals Use “Unflod” Malware to Steal Apple Passwords from iPhones and iPads

Cybercriminals Use “Unflod” Malware to Steal Apple Passwords from iPhones and iPads

The malware only works on certain jailbroken devices

Trojan-SMS.AndroidOS.Stealer.a Is One of the Most Widespread Mobile Trojans

Trojan-SMS.AndroidOS.Stealer.a Is One of the Most Widespread Mobile Trojans

Kaspersky researchers have been monitoring the SMS Trojan

Java RAT UNRECOM Mines for Litecoins, Infects Android Devices

Java RAT UNRECOM Mines for Litecoins, Infects Android Devices

Experts have come across a new version of an old RAT

Hackers Are Scanning the Web for Websites Vulnerable to Heartbleed Attacks

Hackers Are Scanning the Web for Websites Vulnerable to Heartbleed Attacks

Experts say mobile applications are also vulnerable

 
Want more? Browse: