Hackers use the “watering hole” technique in order to steal passwords. The malware still have security researchers scratching their heads on what else it can do.
Hackers placed ransomware ads on the Huffington Post website demanding for USD$300.
The spam emails try to lure users with misleading, fake invoices from banks, telephone companies and even PayPal in order to steal bank account credentials.
Ransomware ‘Cryptowall 2.0′ is using the TOR network to mask its tracks. It encrypts users data and asks for ransom in return for the key to unencrypt the data.
Microsoft warns that hackers are using email to phish for users to turn on the macro features in Microsoft Office in order to install malware.
It has been discovered that a Chinese smartphone company by the name of Coolpad has loaded Android phones with malware that steals information, installs apps and can disable system features.
Hackers are using the Steam Chat room to spread dangerous malware by sending hyperlinks that appear to come from a trusted friend.
South Korean nuclear reactor was breached with an unauthorized USB device containing malware.
The app Android/Badaccents claims to download the movie The Interview, but instead torments Android users who download the app with a banking trojan that has already infected more than 20,000 users.
Chthonic trojan is infecting Microsoft products by stealing online banking information using spear-phising and web injection attacks.
Emsisoft Anti-Malware for Server detected all malware and received the highest award that Virus Bulletin offers.
Microsoft, BlackBerry, Android and (jailbroken) Apple phones infected with Inception/Cloud Atlas malware that steals sensitive user information.
Linux impregnable to malware? Last week, security researchers discovered a new trojan that infected Linux operating systems around the world, targeting government and pharmaceutical companies.
By now most users will already be familiar with ransomware, either because they have been affected by it themselves at some point or because they have seen it on a friend’s PC. Ransomware usually refers to a special category of malware that essentially tries to hold a user’s computer and files hostage and demands payment […]
We received so many spam emails about BBB (Better Business Bureau) and IRS (Internal Revenue Service) that we had a closer look at it. The emails come from spoofed addresses, such as alert[at]irs.com, subscriptions[at]irs.com, accounts[at]irs.com, etc. Dear Accountant Officer, Hereby you are notified that your Tax Return Appeal id#[NUMBER] has been REJECTED. If you consider […]
News about the death of Steve Jobs has been exploited by cyber-criminals by sending spam emails associated with this incident. The spam email has a subject like “Steve Jobs: Not Dead Yet!“, “Is Steve Jobs Really Dead?“, “Steve Jobs Alive!“, or “Steve Jobs Not Dead!“. Clicking on the link provided will take the user to […]
Internet has come of age, and with it malicious software and related infections. Viruses, Trojans and advertising software and popups have been there and the numbers have increased with time. With the advent of new century, especially in last 5 years, there has been an introduction to newer types of malicious software, namely spywares and […]