Virus alerts  

  •  
  • By Eduard Kovacs
  • September 11th, 2012
“Dangerous” Celebrities of 2012: Emma Watson, Jessica Biel and Eva Mendes

“Dangerous” Celebrities of 2012: Emma Watson, Jessica Biel and Eva Mendes

Search for them on Google and you'll most likely end up on a malware-laden site

  •  
  • By Eduard Kovacs
  • September 10th, 2012
Gaeilge Language Ransomware Targets Users from Ireland

Gaeilge Language Ransomware Targets Users from Ireland

Cybercriminals translate their messages to ensure the success of their campaigns

  •  
  • By Eduard Kovacs
  • August 31st, 2012
Java Zero-Day Leveraged in Nitro Campaign

Java Zero-Day Leveraged in Nitro Campaign

The exploit was used in combination with Poison Ivy

  •  
  • By Eduard Kovacs
  • August 31st, 2012
Unknown Virus Disrupts World’s Second Largest Liquefied Natural Gas Company

Unknown Virus Disrupts World’s Second Largest Liquefied Natural Gas Company

The incident follows the attack on oil giant Saudi Aramco

  •  
  • By Eduard Kovacs
  • August 30th, 2012
Worm Spreads via Facebook, Skype, GTalk, MSN, Pidgin and ICQ

Worm Spreads via Facebook, Skype, GTalk, MSN, Pidgin and ICQ

The malware can cause a lot of damage if an antivirus isn’t present

  •  
  • By Eduard Kovacs
  • August 29th, 2012
Researchers Unable to Link Mysterious Wiper Malware to Flame

Researchers Unable to Link Mysterious Wiper Malware to Flame

There's not enough evidence to connect it to Duqu and Stuxnet either

  •  
  • By Eduard Kovacs
  • August 25th, 2012
Cybercriminals Hijack Servers Remotely with Hikit APT

Cybercriminals Hijack Servers Remotely with Hikit APT

The attacker contacts the malware, not the other way around

  •  
  • By Eduard Kovacs
  • August 24th, 2012
Loozfon Android Malware Steals Contact Details from Female Users

Loozfon Android Malware Steals Contact Details from Female Users

The cybercriminals’ main purpose is to advertise a paid dating service

  •  
  • By Eduard Kovacs
  • August 23rd, 2012
Androm Trojan Variant Comes in Fake Booking.com Emails

Androm Trojan Variant Comes in Fake Booking.com Emails

The company is warning customers to be on the lookout for such notifications

  •  
  • By Eduard Kovacs
  • August 22nd, 2012
Bogus Flash Player for Android Hides Adware and Trojans

Bogus Flash Player for Android Hides Adware and Trojans

Experts identified a number of sites which serve fake applications

  •  
  • By Eduard Kovacs
  • August 22nd, 2012
Crisis Spreads to Macs, Windows Computers, Mobile Devices and Virtual Machines

Crisis Spreads to Macs, Windows Computers, Mobile Devices and Virtual Machines

Researchers from Symantec analyze the new malware

  •  
  • By Eduard Kovacs
  • August 21st, 2012
Ransomware: Bad Guys, Good Guys and Untraceable Money Transfer Systems

Ransomware: Bad Guys, Good Guys and Untraceable Money Transfer Systems

ESET experts detail the way a ransomware scheme works

  •  
  • By Eduard Kovacs
  • August 21st, 2012
Adobe Flash Player Exploit Served Via “iPhone 5 Battery Images Leak” Emails

Adobe Flash Player Exploit Served Via “iPhone 5 Battery Images Leak” Emails

A harmless-looking document contains malicious .swf files

  •  
  • By Eduard Kovacs
  • August 20th, 2012
SMSZombie Trojan Exploits Vulnerability in China Mobile's Payment System

SMSZombie Trojan Exploits Vulnerability in China Mobile's Payment System

The malware has infected the devices of over 500,000 users

  •  
  • By Eduard Kovacs
  • August 17th, 2012
Shamoon Malware Covers Its Tracks by Wiping Master Boot Record

Shamoon Malware Covers Its Tracks by Wiping Master Boot Record

Experts from three different companies have analyzed the threat

  •  
  • By Eduard Kovacs
  • August 17th, 2012
MyAgent Trojan Targets Aerospace, Chemicals, Technology and Defense Industries

MyAgent Trojan Targets Aerospace, Chemicals, Technology and Defense Industries

The malware uses a legitimate PDF document to mask its true purpose

  •  
  • By Eduard Kovacs
  • August 16th, 2012
Trojan Hides Its Payload by Using NTFS’s Extended Attributes Feature

Trojan Hides Its Payload by Using NTFS’s Extended Attributes Feature

The malware spreads as cracks and fake video codecs

 
Want more? Browse: