- Security
- By Eduard Kovacs
- February 15th, 2013
Largest Percentage of 2012 Cyberattacks Originated in Romania, Study Finds
Trustwave has released its 2013 Global Security Report
- Security
- By Eduard Kovacs
- February 14th, 2013
Websense Security Labs Releases 2013 Threat Report
The study covers mobile, email, web-based and social threats
- Virus alerts
- By Eduard Kovacs
- February 14th, 2013
Suspicious-Looking Code Planted on Joomla Sites Hides Malware
Avast! experts have analyzed the cleverly-obfuscated code
- Security
- By Eduard Kovacs
- February 14th, 2013
VIPRE Report for January 2013: Social Network-Based Attacks Highly Prevalent
GFI Software reveals some interesting aspects about the latest threats
- Virus alerts
- By Eduard Kovacs
- February 14th, 2013
Cybercriminals Exploit Microsoft Office Flaws to Attack Uyghur Mac Users
Experts from Kaspersky and AlienVault have analyzed the campaign
- Virus alerts
- By Eduard Kovacs
- February 14th, 2013
LA Times Cleans Up Website, but over 320,000 Have Been Exposed to Malware Attack
A subdomain was abused to serve malware for six weeks
- Security Blog
- By Eduard Kovacs
- February 14th, 2013
Bogus Intercompany Invoices Carry Malicious HTML Files
The files redirect users to websites that contain obfuscated code
- Apple & Mac Blog
- By Filip Truta
- February 13th, 2013
Intego’s New “Identity Scrubber” Protects Sensitive Information on Your Mac
Intego refreshes its lineup of security programs for Macintosh users
- Security Blog
- By Eduard Kovacs
- February 13th, 2013
Cybercriminals Hide Their Malicious Code by Injecting It into JavaScript
SophosLabs experts have found several affected websites
- Security Blog
- By Eduard Kovacs
- February 12th, 2013
Sanny Malware Campaign Highly Successful in Targeting Russia, Experts Say
Cyveillance has analyzed the advanced persistent threat
- Virus alerts
- By Eduard Kovacs
- February 12th, 2013
Cybercriminals Use ZeuS Trojan Against Customers of Japanese Bank
Five major financial institutions from Japan are targeted
- Security Blog
- By Eduard Kovacs
- February 12th, 2013
Frutas: Java-Based Cross-Platform RAT
Symantec experts have analyzed the tool that is mainly used by Spanish hackers
- Security Blog
- By Eduard Kovacs
- February 11th, 2013
Citi Group Customers Warned About Fake Malware-Spreading Secure Messages
Bitdefender experts believe this is part of a larger campaign
- Security
- By Eduard Kovacs
- February 11th, 2013
Japanese Police Arrest Hacker Suspected of Using Threat-Making Malware
Authorities have identified him after analyzing security cameras
- Security
- By Eduard Kovacs
- February 8th, 2013
11-Year-Old Children Are Writing Malware, AVG Says
A perfect example is a RuneScape Trojan that's designed to steal login credentials
- Security Blog
- By Eduard Kovacs
- February 7th, 2013
Experts Uncover DIY HTTP-Based Botnet Tool
Such kits allow even less-skilled criminals to operate a botnet
- Security Blog
- By Eduard Kovacs
- February 7th, 2013
Cybercriminals Test Out New Whitehole Exploit Kit
Trend Micro experts say the toolkit is only in "test-release" mode