Browsing Tag: malware

Categories: Malware

[img_assist|nid=4936|title=|desc=|link=none|align=right|width=100|height=100]There is a new point-and-click tool circulating online that enables virtually anyone to create a piece of malware that will connect a PC to a budding Twitter botnet.

Read more...

[img_assist|nid=4941|title=|desc=|link=none|align=left|width=100|height=100]The cybercriminals behind the intensifying phishing scam that has
been plaguing Twitter since late last week are proving how easy it is to
pervert the trust social networks like Twitter and Facebook along with
search giant Google have made a cornerstone of their respective business
models. The idea is to get Web users accustomed to using their Twitter, or
Gmail or Facebook credentials as  a “single sign-on” to access the Web’s
coolest apps. Read the full article. [The Last Watchdog]

Read more...

Categories: Malware, Web Security

The pace of innovation on mobile phones and other smart wireless devices has accelerated greatly in the last few years, adding features, speed and computing power. But now the attackers are beginning to outstrip the good guys on mobile platforms, developing innovative new attacks and methods for stealing data that rival anything seen on the desktop, experts say.

Read more...

[img_assist|nid=4842|title=|desc=|link=none|align=left|width=100|height=100]For the past 20 months, Carnegie Mellon University’s Human Computer Interaction Institute has been measuring referrals from phishing sites to an education page set up by the Anti-Phishing Working Group (APWG). Hong said the site now receives close to 25,000 referrals per month from phishing sites that brand owners have modified. Read the full article. [KrebsonSecurity]

Read more...

Categories: Vulnerabilities

[img_assist|nid=4792|title=|desc=|link=none|align=center|width=475|height=154]For years, security experts, analysts and even users have been lamenting the state of desktop security. Viruses, spam, Trojans and rootkits have added up to create an ugly picture. But, the good news is that the desktop security battle may be over.

Read more...

Categories: Malware

[img_assist|nid=4675|title=|desc=|link=none|align=right|width=100|height=100]The criminals behind the Gumblar botnet and malware campaign have been adapting their techniques, as attackers are wont to do, in order not only to evade detection but to prevent researchers from downloading and analyzing new versions of the malware.

Read more...