The largest Google account breach is affecting as many as 13,000 Android users every day. The main objective of the malware is to increase ad revenue for its developers but there are greater implications such as data theft and third-party access to devices.
The verdict is in: Emsisoft has proven itself once again to be more than just reliable, but outstanding. Read on to learn about our new AV-Comparatives award.
Do you ever wonder how Emsisoft scanning technology works to keep your computer safe? Let’s examine the powerful, dual engine scanner together.
Ransomware “Locker” automatically decrypts all affected files, after its creator is struck by conscience
Locker, a new ransomware variant was discovered last month. In a surprising turn of events the creator of the ransomware actually posted a public apology and promised to automatically decrypt files on affected systems.
A new variant of the POS malware family has emerged that is capable of stealing track one and track two payment card data.
Malvertising networks lead users to ransomware using the Magnitude exploit kit. CryptoWall 3.0 is the first malware dropped.
Hackers are now using legitimate services offered by popular websites and blogs to masquerade their malicious operations.
Want to watch a “shocking video” on Facebook? Not a good idea. It is just a scam and the only end result is, the scammers making money out of your personal information.
Macro malware returns, infecting over 500,000 computers through malicious documents spread via spam email.
A new platform dubbed WattsUpDoc developed by Phd’s Benjamin Ransford and Dennis Foo Kune can be used to detect and treat malware on medical devices using AC power.
A recent study unveils various types of IRC Botnets and their different infection and propagation methods.
An Arkansas lawyer found out that the cops had sent him a hard drive filled with malware that could be used for spying purposes.
Several government and private agencies target the Beebone botnet which has infected over 12,000 computers. Europol has claimed that they have successfully ‘sinkholed’ the botnet by registering, suspending or seizing all domain names with which the malware could communicate and traffic was then redirected.
A popular Chrome extension known as Webpage screenshot starts collecting sensitive user information a week after installation for financial benefits. The sleep-activate feature of this spyware allows it to evade security measures, which highlights a greater issue with the current app/extension verification system.
Have you received an email recently with an unusual attachment? It may be the trojan downloader waski, disguised as a pdf file. This banking trojan steals login credentials by directing users to modified versions of bank websites. It can also directly intercept the traffic containing login information in most popular browsers like Chrome and IE.