Virus alerts  

  •  
  • By Eduard Kovacs
  • August 16th, 2012
Bafruz Malware Replicates Antivirus Software in Order to Disable It, Microsoft Finds

Bafruz Malware Replicates Antivirus Software in Order to Disable It, Microsoft Finds

Users can now remove the Trojan with the aid of the Malicious Software Removal Tool

  •  
  • By Eduard Kovacs
  • August 16th, 2012
Malicious "AntiHacker" Tool Installs DarkComet RAT to Spy on Syrian Activists

Malicious "AntiHacker" Tool Installs DarkComet RAT to Spy on Syrian Activists

Supporters of the Syrian regime have once again launched a malicious operation

  •  
  • By Eduard Kovacs
  • August 14th, 2012
VPN Credentials of International Airport Employees Stolen by Trojan

VPN Credentials of International Airport Employees Stolen by Trojan

Citadel's screen grabbing capabilities are put to good use

  •  
  • By Eduard Kovacs
  • August 10th, 2012
Tilon Trojan Relies on “Search and Replace” Mechanism to Alter Bank Websites

Tilon Trojan Relies on “Search and Replace” Mechanism to Alter Bank Websites

Tursteer experts identify a new version of the Silon malware

  •  
  • By Eduard Kovacs
  • August 10th, 2012
FBI on Reveton Ransomware: We Are Getting Dozens of Complaints Every Day

FBI on Reveton Ransomware: We Are Getting Dozens of Complaints Every Day

Some versions of the threat hijack the webcam to take pictures of the victim

  •  
  • By Eduard Kovacs
  • August 10th, 2012
Dorifel Malware Targets the Financial Details of Users from Netherlands

Dorifel Malware Targets the Financial Details of Users from Netherlands

Kaspersky experts have found that the Trojan has already made over 3,000 victims

  •  
  • By Eduard Kovacs
  • August 9th, 2012
Gauss: State-Sponsored Banking Trojan Based on Flame Platform

Gauss: State-Sponsored Banking Trojan Based on Flame Platform

Kaspersky experts detail a highly sophisticated piece of malware

  •  
  • By Eduard Kovacs
  • August 8th, 2012
Shylock Trojan Injects Attacker’s Phone Number into Bank Websites

Shylock Trojan Injects Attacker’s Phone Number into Bank Websites

The Shakespearean virus returns with an ace up its sleeve

  •  
  • By Eduard Kovacs
  • August 8th, 2012
F-Secure: 19 New Families of Android Malware Appeared in Q2 2012

F-Secure: 19 New Families of Android Malware Appeared in Q2 2012

The security firm's mobile threat report details the latest events and malicious elements

  •  
  • By Eduard Kovacs
  • August 7th, 2012
Mobile Version of ZeuS Trojan Targets BlackBerry Users

Mobile Version of ZeuS Trojan Targets BlackBerry Users

Four different samples have been identified by experts from Kaspersky

  •  
  • By Ionut Arghire
  • July 25th, 2012
New OSX/Crisis Trojan Found for Apple’s Mac Computers

New OSX/Crisis Trojan Found for Apple’s Mac Computers

It can install without user permissions, can hide itself

  •  
  • By Eduard Kovacs
  • July 19th, 2012
Good Guys Win: Grum, Third Largest Botnet in the World, Disrupted

Good Guys Win: Grum, Third Largest Botnet in the World, Disrupted

The number of IPs used to send out spam dropped from 120,000 to 21,000 almost immediately

  •  
  • By Eduard Kovacs
  • July 18th, 2012
SMS, Email and Phone Call Floods Used by Fraudsters to Hide Illegal Money Transfers

SMS, Email and Phone Call Floods Used by Fraudsters to Hide Illegal Money Transfers

An efficient way to ensure that banks can't confirm high value transactions

  •  
  • By Eduard Kovacs
  • July 18th, 2012
Madi Malware: Another Trojan Targets Organizations from the Middle East

Madi Malware: Another Trojan Targets Organizations from the Middle East

Unlike Stuxnet and Flame, Madi relies on social engineering to infect computers

  •  
  • By Eduard Kovacs
  • July 17th, 2012
Dutch Authorities Take Down C&C Servers Used by Third Largest Spam Botnet

Dutch Authorities Take Down C&C Servers Used by Third Largest Spam Botnet

There’s less spam in the world after two of Grum’s servers have been taken down

  •  
  • By Eduard Kovacs
  • July 16th, 2012
Scareware Leverages Reputation of Industrial Espionage Malware

Scareware Leverages Reputation of Industrial Espionage Malware

The scammers don’t know what Medre is or how to remove it

  •  
  • By Eduard Kovacs
  • July 12th, 2012
Experts: Phishing Campaigns Changed Since “Blackhole” Came into the Picture

Experts: Phishing Campaigns Changed Since “Blackhole” Came into the Picture

Trend Micro experts published a detailed paper on spam runs that rely on the exploit kit

 
Want more? Browse: