Fake Chase Paymentech Merchant Billing Statements Found to Carry Malware

Fake Chase Paymentech Merchant Billing Statements Found to Carry Malware

Users advised to be on the lookout for malicious emails

Linux Rootkit, Perfect for Targeted Attacks and Drive-by Download Scenarios, Found

Linux Rootkit, Perfect for Targeted Attacks and Drive-by Download Scenarios, Found

Experts from Kaspersky and CrowdStrike have analyzed the new threat

GFI October 2012 Report: Large Number of BlackHole Exploits Identified

GFI October 2012 Report: Large Number of BlackHole Exploits Identified

Users were lured to malicious websites with all sorts of spam messages

Malware Alert: Tsunami in Australia on New Year’s Eve 2013

Malware Alert: Tsunami in Australia on New Year’s Eve 2013

Cybercriminals rely on bogus news articles to spread malicious files

IDF Spokesperson’s Gmail Account Hacked, Used in Xtreme RAT Campaign

IDF Spokesperson’s Gmail Account Hacked, Used in Xtreme RAT Campaign

The malicious element connects to a C&C server located in the United States

Malware Targeting Windows 8 Relies on Google Docs as Proxy

Malware Targeting Windows 8 Relies on Google Docs as Proxy

Backdoor.Makadocs also works on Windows Server 2012

Cybercriminals Send Xtreme RAT to US, UK and Other Government Employees

Cybercriminals Send Xtreme RAT to US, UK and Other Government Employees

Turkey, Macedonia, New Zealand, Latvia and Slovenia are also targeted

Telstra Warns Users of Fake “MMS” Emails Containing Malware

Telstra Warns Users of Fake “MMS” Emails Containing Malware

The cybercriminals behind the Wauchos malware have moved operations to Australia

Malware Uses Social Media and Blogging Sites as Part of Its C&C Server

Malware Uses Social Media and Blogging Sites as Part of Its C&C Server

FireEye researchers have analyzed an interesting threat

Microsoft’s Malware Removal Tool Updated and Released for Download

Microsoft’s Malware Removal Tool Updated and Released for Download

The Malicious Software Removal Tool gets a new version

Researchers Uncover New Imuler OS X Trojan Designed to Target Tibetan Activists

Researchers Uncover New Imuler OS X Trojan Designed to Target Tibetan Activists

The malware is designed to steal sensitive information

Young Indian Hacker Claims to Have Created Windows Phone 8 Malware

Young Indian Hacker Claims to Have Created Windows Phone 8 Malware

The prototype is capable of stealing all sorts of information

Experts Investigate Malware Used in Gozi-Prinimalka Campaign Against US Banks

Experts Investigate Malware Used in Gozi-Prinimalka Campaign Against US Banks

Trend Micro researchers have identified some of the targeted institutions

Blackhat SEO Poisoning: “Djia Finance” Searches Lead to BlackHole 2.0

Blackhat SEO Poisoning: “Djia Finance” Searches Lead to BlackHole 2.0

The malware is only detected by a low number of antivirus products

Experts Identify Cyber Espionage Campaign Against Palestinian and Israeli Targets

Experts Identify Cyber Espionage Campaign Against Palestinian and Israeli Targets

The attacks have been ongoing for at least one year

Wauchos Malware Hits UK via Vodafone, British Airways Spam Campaigns

Wauchos Malware Hits UK via Vodafone, British Airways Spam Campaigns

The threat accounts for 24% of all United Kingdom detections

Season Scams: Christmas Cards, Gifts, Letters from Santa

Season Scams: Christmas Cards, Gifts, Letters from Santa

Symantec experts say we should expect a sharp spike in the volume of such spam

 
Want more? Browse: