Shamoon, a piece of malware that tries to turn infected computers into unusable bricks, is back. Earlier this month, a number of...
Comodo security researchers have spotted version 2.0 of a deadly Android trojan named Tordow, which first came to light in February this...
Just in time for the Christmas holiday shopping spree, the group behind the Cerber ransomware has launched a spam campaign that uses...
Security firm warns of Trojans shipping with stock firmware. Russian security company Dr. Web, who also makes a PC antivirus solution bearing the...
Malware authors have released a new version of the Android Loki trojan, which can now infect native Android OS libraries after an...
Symantec warns of growing number of malicious scripts. Microsoft PowerShell is a really powerful tool for IT professionals running Windows, and the...
North Korea appears to have hacked South Korea’s cyber command in what could be the latest cyberattack against Seoul, the military here...
Over the last few months, we’ve seen a proliferation of these tech-support scams where users end up “locked” in their browsers with...
Manipulated images are almost impossible to detect by the untrained eye. Millions of people visiting mainstream websites over the past two months...
The author of the Petya-Mischa ransomware combo has returned with a new version that uses the name GoldenEye Ransomware, continuing the malware’s...
A new report from the respected independent testing agency AV-Test.org reveals some scary-sounding facts about the state of malware today. According to...
The Canadian government is asking citizens for their feedback on several privacy and cyber-security topics, as part of a public consultation period...
Visiting popular websites and getting infected without any interaction? ESET explains how the stealthy Stegano exploit kit, hiding in the pixels of...
Crooks are spreading Android malware disguised as a one-time password (OTP) generator app for banking apps that steals the user’s banking credentials...
A year after its disruption on 2nd December 2015, We Live Security looks at life after Dorkbot.
Symantec plays part in takedown of the Avalanche malware-hosting network. The Avalanche malware-hosting network has been dealt a severe blow following the...
Earlier this week coordinated law enforcement action took down the Avalanche fast-flux network. ESET has been assisting in the cleanup.
Recently, we discovered a new Google Android Trojan named “PluginPhantom”, which steals many types of user information including: files, location data, contacts...
A new multi-functional malware family detected as Proteus can transform the computers of infected users in proxy servers, can mine for various...
You probably know MailChimp either as an email newsletter service, or the company that seems to have adverts on every single podcast...
Researchers have discovered a new hacking campaign leveraging on Facebook Messenger to spread the Locky ransomware via SVG images. The Locky Ransomware is spread...