Malware News
  • How Nigerian cyber criminals have evolved

    22 July 2014

    Cyber criminals in Nigeria have evolved common malware campaigns to infiltrate businesses that have not previously been their primary targets, according to Palo Alto Networks. Nigerian...

  • Funny Facebook video scam leaves unamusing Trojan

    21 July 2014

    A new funny video spreading on Facebook leaves a not-so-hilarious Trojan in its wake on users’ computers, according to research by Bitdefender. The malware, believed to originate from...

  • Mayhem malware ropes Linux, UNIX servers into botnets

    18 July 2014

    A new malware that researchers have dubbed Mayhem is being used to target Linux and Unix web servers and has so far compromised over 1,400 Linux and FreeBSD servers around the world,...

  • Fake Flash Player steals credit card information

    18 July 2014

    A new trojan that's after credit card details is targeting Android users, warn antivirus experts from Dr. Web. The malware is currently targeting Russian users, but it can easily be...

  • Government-grade malware used for ransomware attacks

    18 July 2014

    It was only a matter of time until cyber criminals got their hands on a piece of government-made malware and repurposed it for their own criminal needs. Sentinel Labs researchers...

  • Botnets gain 18 infected systems per second

    17 July 2014

    "According to industry estimates, botnets have caused over $9 billion in losses to US victims and over $110 billion in losses globally. Approximately 500 million computers are infected...

  • Pushdo Trojan infects 11,000 systems in 24 hours

    17 July 2014

    Bitdefender has discovered that a new variant of the Trojan component, Pushdo, has emerged. 77 machines have been infected in the UK via the botnet in the past 24 hours, with more than...



Spotlight

Intentional backdoors in iOS devices uncovered

Posted on 22 July 2014.  |  A researcher has revealed that Apple has equipped its mobile iOS with several undocumented features that can be used by attackers and law enforcement to access the sensitive data contained on the devices running it.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Tue, Jul 22nd
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //