Malware News
  • Amazon-hosted malware triples in 6 months

    15 July 2014

    Solutionary analyzed the threat landscape and identified the top 10 global ISPs and hosting providers that hosted malware out of more than 21,000 ISPs. Amazon remained the top malware-hosting...

  • Google testing new phishing and malware warnings

    14 July 2014

    A Google engineer and a member of the Google Chrome security team has shared on Twitter a new look that is being tested for the phishing and malware warnings seen by Chrome users: The...

  • Global action targeting Shylock malware

    14 July 2014

    On 8 and 9 July 2014, an alliance of law enforcement and industry undertook measures against the Internet domains and servers that form the core of an advanced cybercriminal infrastructure...

  • DoJ provides update on Gameover Zeus and Cryptolocker disruption

    14 July 2014

    The Justice Department filed a status report with the United States District Court for the Western District of Pennsylvania updating the court on the progress in disrupting the Gameover...

  • CryptoLocker is temporarily disabled, users still at risk

    11 July 2014

    Bitdefender warns that while CyptoLocker is currently disabled, it could come back to life at any moment. As such, users need to take precautions to protect against this threat. The...

  • Global rise in Android banking and payment malware

    10 July 2014

    Mobile banking and mobile payment malware – malicious software that can extort money from users by hijacking personal information and spoofing bank sites or apps to trick victims into...

  • Travelers targeted by infected travel websites

    07 July 2014

    Proofpoint security researchers recently were the first to discover that a large number of travel destination websites had been compromised and were being used to deliver the Nuclear...


Intentional backdoors in iOS devices uncovered

Posted on 22 July 2014.  |  A researcher has revealed that Apple has equipped its mobile iOS with several undocumented features that can be used by attackers and law enforcement to access the sensitive data contained on the devices running it.

Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.

Daily digest

Receive a daily digest of the latest security news.


Tue, Jul 22nd