FireEye Helps IT Security Pros Identify the Origin of Advanced Cyberattacks

FireEye Helps IT Security Pros Identify the Origin of Advanced Cyberattacks

The company has also identified a new attack tactic used by the Comment Crew

Gamarue Malware-Spreading Emails Purporting to Come from Qantas Spotted Again

Gamarue Malware-Spreading Emails Purporting to Come from Qantas Spotted Again

Trustwave’s SpiderLabs has analyzed the malicious messages

Link Found Between March and June Attacks Against South Korea

Link Found Between March and June Attacks Against South Korea

A time-triggered piece of malware is responsible for the DDOS attacks

Fake Xbox One Emulator Advertised on YouTube Hides Malware

Fake Xbox One Emulator Advertised on YouTube Hides Malware

Malwarebytes experts have analyzed the Xbox One scam

SimDisk Auto-Update Mechanisms Compromised, Abused Against South Korean Users

SimDisk Auto-Update Mechanisms Compromised, Abused Against South Korean Users

Cybercriminals altered the installer to distribute a malicious file

Carberp Malware Source Code Leaked

Carberp Malware Source Code Leaked

Researchers are still analyzing the code, but they've confirmed that it's genuine

Google Adds Malware Data from All Over the World to Its Transparency Report

Google Adds Malware Data from All Over the World to Its Transparency Report

Google has a great overview of the web, including the seedier parts

Chinese Hackers Use PinkStats Malware Against South Korean Organizations

Chinese Hackers Use PinkStats Malware Against South Korean Organizations

The malware has been used in cyberattacks since 2009

Only 6% of Companies Recognize the True Scale of Malicious Software, Study Shows

Only 6% of Companies Recognize the True Scale of Malicious Software, Study Shows

2013 Global Corporate IT Security Risks report by Kaspersky and B2B International

DirtJumper Malware Version Dubbed “Drive” Sports Powerful DDOS Engine

DirtJumper Malware Version Dubbed “Drive” Sports Powerful DDOS Engine

Arbor Networks researchers have analyzed the new variant

Information-Stealing Fareit Malware Used Against Wells Fargo Customers

Information-Stealing Fareit Malware Used Against Wells Fargo Customers

The Trojan is capable of performing a wide range of malicious activities

The Chrome Web Store Gets Improved Spam and Malware Check

The Chrome Web Store Gets Improved Spam and Malware Check

Google is warning developers that it may take longer for apps to go live

Malware Alert: “Hey User Your Facebook Account Has Been Closed!”

Malware Alert: “Hey User Your Facebook Account Has Been Closed!”

Avast! experts provide a detailed technical analysis of the attack

Government Security News and 60 Other Websites Hacked, Abused to Serve Malware

Government Security News and 60 Other Websites Hacked, Abused to Serve Malware

Java vulnerabilities exploited to push the ZeroAccess Trojan

Trojan Uses Fake Adobe Certificate to Evade Detection

Trojan Uses Fake Adobe Certificate to Evade Detection

Symantec experts have analyzed an interesting variant of Backdoor.Trojan

ZeuS Malware Used to Lure Victims to Money Mule Recruitment Website

ZeuS Malware Used to Lure Victims to Money Mule Recruitment Website

The malware uses Man-in-the-Browser (MitB) techniques to inject ads

Kilim Trojan Hijacks Social Media Accounts with Rogue Browser Extensions

Kilim Trojan Hijacks Social Media Accounts with Rogue Browser Extensions

Microsoft experts warn that social bots are on the rise

 
Want more? Browse: