Malware/Cybercrime

Malware/Cybercrime news, information, and how-to advice

ransom note letters
Businessman holding holiday gift box 187371991

NotCompable sets new standards for mobile botnet sophistication

The NotCompatible mobile malware has reached a new level of sophistication. The malware was first detected in 2012, but the newly discovered variant, NotCompatible.C, is the most complex mobile malware ever seen.

admiral mike rodgers nsa

NSA chief says cyberattacks on industrial systems are his top concern

Nation states and groups are engaging in risky behavior in the absence of cyberspace rules

policyjne radiowozy

Intel to work with Europol on fighting cybercrime

Intel's McAfee branch will share technical information with the European Cybercrime Centre

surveillance

Activists release Detekt tool that finds surveillance malware

The tool is a joint project of multiple privacy groups who investigated malware used to target journalists and human rights activists

Android

Long-running Android botnet evolves, could pose threat to corporate networks

The 'NotCompatible' Android Trojan now uses peer-to-peer encrypted communication, researchers from Lookout said

malware keyboard

Attackers trading malware for privilege

Hackers will use malware, among other techniques, to break into enterprise systems but once they're in, they're likely to switch away from malware to abusing privileged accounts.

malware primary 100369041 orig

Android and iOS apps still being cloned to spread malware

Finance, healthcare and retail are top targets

spam

Scammers move from Ebola phishing to fundraising

Scammers routinely try to take advantage of humanitarian disasters to get people to open phishing emails, or to donate money to fake organizations. This month, they combined the two approaches, sending out approximately 700,000 spam...

People talking illustration

Bash malware targets embedded devices running BusyBox

Attackers use malware dubbed Bashlite to scan for and install backdoors on routers and other systems running BusyBox

ransomware

New ransomware CoinVault allows users to decrypt one file for free

Cybercriminals use freebie tactic in attempt to increase ransomware success rate

trends data chart growing ladder cloud

The top infosec issues of 2014

Security experts weigh in on the top IT security trends of 2014, what was learned and what needs to be done

us state department

Reports: State Department admits intrusion into unclassified email

The agency shut down its unclassified email system and parts of its website on Friday, according to the reports

credit card swipe

Georgia man sentenced to nine years for stolen credit card data

The man was one of 55 people charged related to the Carder.su online marketplace

gmail hijack

Google warns of deadly manual account hijacking attacks

Maximum damage, difficult recovery

bounty hunter

Why bug bounty hunters love the thrill of the chase

The financial reward of hunting for bugs is nice, but these White Hat hackers often find holes for companies simply because they love the challenge. What motivates them? And how can you get involved?

natanz nuclear facility Iran

First Stuxnet victims were five Iranian industrial automation companies

To reach the uranium enrichment plant at Natanz, Stuxnet's creators likely targeted Iranian companies tied to it, researchers said

Tibet prayer flags

Rights groups, NGOs struggle against malware attacks

The groups aren't able to defense themselves as well as large organizations, according to The Citizen Lab

phishing

Amazon phishing attacks pick up for holiday shopping season

Using brands such as Amazon and eBay, hackers are gearing up for the big holiday shipping season with a new collection of emails that are just too good not to click on.

Load More