New stolen digital certificates are used by the multi-purpose backdoor Qbot. The criminals behind the Qbot trojan are certainly not inactive. As...
A new trojan has been released targeting the Macintosh Chinese-language user community. The trojan appears to the user to be a...
Google+ seems to be continuing building steam and putting itself on the map as a contender, not merely an also-ran to the...
The United States Attorney Office for the Southern District of New York received a flurry of attention in April, 2011 when they...
Recently, we’ve noted a steep rise in Android malware and predicted the rise in banking malware, now we see another example in...
Internet scams are not new, and some of the strategies they use are not unique to the Internet, but there is no...
With all the recent headlines about data breaches, should your organization hire a “thief to catch a thief?” That’s a question Kevin...
ESET has discovered a new version of the Delphi infector, Win32/Induc. Unlike its predecessors, however, this variant incorporates a seriously malicious payload...
The authors of Win32/Qbot (a.k.a. Qakbot) are back with new variants of this infamous malware, and this time the binaries are digitally...
Awhile back we mused that the rapid rise in Android malware would hit its stride near the intersection of widespread mobile financial...
…but it doesn't necessarily want you to be free. Since Cameron Camp and I have written here and here about the implications of the...
You may be aware that Cameron Camp and I regularly write articles for SC Magazine's Cybercrime Corner: here here's a catch-up list of the...
Okay, so they grew from nothing to ubiquity in a few years, hey, my mom has an account. With the growth, users...
Can’t find a way to support a hacktivist with your l337 sK1LLz? Turns out they take tips, bitcoin tips. We mused awhile...
Is that possible? Well, a researcher with Identity Finder, Aaron Titus, believes so, since he says he managed to use internet searches...
... people have been asking me about Google's interesting paper on Trends in Circumventing Web-Malware Detection...
Nearly three years old, the Conficker worm continues to pose a threat to PCs. Aryeh Goretsky wants to know why this is,...
Aryeh Goretsky interviewed, as his paper on Possibly Unwanted Applications is published.
I have an Android in my pocket as I type, with all kinds of cool apps ranging from GPS navigation to acoustic...
On the heels of the recent activity with Stuxnet, the industrial process control computer worm that targeted Iranian nuclear centrifuges, a Blackhat...