- By Eduard Kovacs
- June 28th, 2012
Malware Authors Upgrade Exploit Kits to Randomly Generate Domains
Blackhole and RedKit have been seen to posses such functionality
- By Eduard Kovacs
- June 27th, 2012
Operation High Roller: Fraudsters Steal Millions from High Balance Bank Accounts
Automated malware allows cybercriminals to access accounts worldwide
- By Eduard Kovacs
- June 25th, 2012
Spammers: I Have Proof That You Broke Into My Email
"Pictures" attached to messages hide malicious Trojans
- By Eduard Kovacs
- June 23rd, 2012
Fake Flash Update Hides Malicious IE, Firefox and Chrome Extensions
Phony add-ons are not detected by AV engines because they’re text files
- By Eduard Kovacs
- June 22nd, 2012
Trojan Causes Printers Worldwide to Print Until They Run Out of Paper
This is actually a side effect, not the malware's main goal
- By Eduard Kovacs
- June 21st, 2012
Industrial Espionage: Chinese Malware Steals Tens of Thousands of AutoCAD Files
ACAD/Medre.A has mainly impacted computer users from Peru
- By Eduard Kovacs
- June 21st, 2012
Experts Confronted by Malware Developer While Researching Diablo III Keylogger
The cybercriminal remotely shut down their computer after trying to access their webcam
- By Eduard Kovacs
- June 20th, 2012
Flame Developed by Israel and US to Sabotage Iran’s Nuclear Program, Officials Say
The NSA, CIA and the Israeli military are named as the ones running the operation
- By Eduard Kovacs
- June 19th, 2012
ZitMo Malware Hides as Android Security Suit Premium
The malicious element is designed to steal SMSs and other system information
- By Eduard Kovacs
- June 19th, 2012
Cybercriminals Upgrade Banking Malware to Include Automatic Transfer Systems
European banks are the main targets because of the security systems they implement
- By Eduard Kovacs
- June 18th, 2012
Tokyo Police Arrests 6 Men Suspected of Spreading Android Virus
The fraudsters earned $250,000 (190,000 EUR) from 211 individuals
- By Eduard Kovacs
- June 15th, 2012
DHS Investigates Malicious Activity on Hospital Equipment Supplier’s Sites
48 Trojans and 3 scripting exploits have been found on the website
- By Eduard Kovacs
- June 15th, 2012
Miley Cyrus Tumblr Tape Scam Leads to Shady Video Player
The application's installation process is full of traps
- By Eduard Kovacs
- June 15th, 2012
Adobe and Java Exploits Pushed via LinkedIn Spam
Cybercriminals increased the frequency of fake notifications after the data breach
- By Eduard Kovacs
- June 12th, 2012
ENISA Publishes Report on Threats from Flame
The paper reminds us of the weaknesses in cyber defenses
- By Eduard Kovacs
- June 11th, 2012
Kaspersky Experts Find Connection Between Flame and Stuxnet
Flame was here before Stuxnet, but researchers didn’t know that until now
- By Eduard Kovacs
- June 8th, 2012
Fake Craigslist Emails Contain Links to Blackhole Exploit Kit
The shady automated email notifications look legitimate