• Security
  • By Lucian Constantin
  • August 3rd, 2010
Large Number of Malicious .MOV Files Found in the Wild

Large Number of Malicious .MOV Files Found in the Wild

Used to trick users into installing malware

Malware Distributed as McAfee VirusScan Trial

Malware Distributed as McAfee VirusScan Trial

Emails promise entry in an unnamed contest

URL Shortners Increasingly Used in Spam

URL Shortners Increasingly Used in Spam

TinyURL and k.im preffered by phishers and malware distributors

Fake eBay Payment Request Emails Lead to Malware

Fake eBay Payment Request Emails Lead to Malware

Attached HTML files redirect to malicious websites

ShopNBC Fake Emails Lead to Malicious Website

ShopNBC Fake Emails Lead to Malicious Website

Visitors infected with malware

DynDNS Abused by Malware Pushers

DynDNS Abused by Malware Pushers

Random sub-domains point to malicious files

Fake Changelog Emails Contain Malware

Fake Changelog Emails Contain Malware

Claim to distribute a log file

Fake DHL Emails Distribute New Trojan

Fake DHL Emails Distribute New Trojan

Masquerade as failed delivery notifications

One in Ten Spam Messages Contains Malware

One in Ten Spam Messages Contains Malware

Europe responsible for almost half of spam traffic in 2010

Localized Twitter Spam Spreads Backdoors

Localized Twitter Spam Spreads Backdoors

Employs BHSEO techniques

Zbot Pushers Claim Eminem Is Dead

Zbot Pushers Claim Eminem Is Dead

Rumor used to distribute the malware via email

Twitter Invitation Email Scam Spreads Malware Downloader

Twitter Invitation Email Scam Spreads Malware Downloader

Unauthorized email change lure still used in spam campaigns

Several Symantec Websites Vulnerable to Cross-Site Scripting

Several Symantec Websites Vulnerable to Cross-Site Scripting

Could be exploited in targeted attacks

Malware Distributors Spam Twitter Users on Recently Used Topics

Malware Distributors Spam Twitter Users on Recently Used Topics

Possible attempts to build Gaza-friendly DDoS botnets

IBM Hands Out Malware at AusCERT Security Conference

IBM Hands Out Malware at AusCERT Security Conference

On a stick

Malicious Executables Hidden in .DOC Files

Malicious Executables Hidden in .DOC Files

Fake lawsuit notifications used as a ruse

 
Want more? Browse: