“Is This Your Skype Profile Pic?” Spam Uses Short Google URLs to Spread Trojan

“Is This Your Skype Profile Pic?” Spam Uses Short Google URLs to Spread Trojan

Victims become entangled in a network of compromised machines

FTC Shuts Down International Phone Scam Network

FTC Shuts Down International Phone Scam Network

Consumers were tricked into paying for non-existent virus infections

Canada Leads the Anti-Malware Global Effort – Microsoft

Canada Leads the Anti-Malware Global Effort – Microsoft

New data shows that Canadians are much more secure than other users

Crocodile Hunter Teaches You How to Stay Protected Online [Video Parody]

Crocodile Hunter Teaches You How to Stay Protected Online [Video Parody]

A highly amusing advisory presented by StopBadware.org and Bluehost

Quervar Malware Found to Download ZeroAcess Trojans and Ransomware

Quervar Malware Found to Download ZeroAcess Trojans and Ransomware

The new variant was identified on September 27 by Trend Micro

Fake AV “System Progressive Protection” Distributed via Drive-By Downloads

Fake AV “System Progressive Protection” Distributed via Drive-By Downloads

The malware prevents users from accessing the apps on their computers

Dorifel Infected over 30 Government and Private Organizations in the Netherlands

Dorifel Infected over 30 Government and Private Organizations in the Netherlands

The indirect damages caused by the malware are 10,000 - 50,000 EUR ($13,000 – $64,000)

Best Themes Songs for Hacking, DDOS Attacks and Malware Payloads

Best Themes Songs for Hacking, DDOS Attacks and Malware Payloads

“Seek and Destroy” by Metallica is appropriate when destroying data, because Metallica is appropriate for everything

  • Security
  • By Eduard Kovacs
  • September 25th, 2012
Security App of the Week: Block LinkBucks

Security App of the Week: Block LinkBucks

A browser extension designed to bypass annoying or malicious advertisements

Imuler.B Mac Malware Designed to Avoid Wireshark, Experts Say

Imuler.B Mac Malware Designed to Avoid Wireshark, Experts Say

The new version of the Mac OS X threat comes with some improvements

KLM e-Ticket Notification Comes with Malicious Attachment

KLM e-Ticket Notification Comes with Malicious Attachment

A piece of malware allows cybercriminals to remotely access the victims' computers

“Your in This” Twitter Spam Leads to Malicious Facebook Video

“Your in This” Twitter Spam Leads to Malicious Facebook Video

A rogue Flash Player update is advertised via direct messages

Amazon “Amazin’ HD TV” Purchase Emails Lead to Trojan

Amazon “Amazin’ HD TV” Purchase Emails Lead to Trojan

Users are tricked into visiting a website that's designed to serve malware

Sophos Antivirus Detects Its Own Components as Malware

Sophos Antivirus Detects Its Own Components as Malware

In some cases, a file needed to perform updates has been deleted

“Twitter Video” Facebook App Spreads via DMs, Leads to Malware

“Twitter Video” Facebook App Spreads via DMs, Leads to Malware

Victims are lead to believe that a fail video of them is making the rounds online

Security Vulnerability in Windows 8 Can Lead to Malware Infection

Security Vulnerability in Windows 8 Can Lead to Malware Infection

Rootkit-based malware could be installed on a Windows 8 machine

Over 1 Million PCs Currently Part of ZeroAccess Global Botnet

Over 1 Million PCs Currently Part of ZeroAccess Global Botnet

The threat is helping cybercriminals earn as much as $100,000 (80,000 EUR) per day

 
Want more? Browse: