Malware/Cybercrime news, information, and how-to advice

holiday scams
sony headquarters


'Less' means more to malware authors targeting Linux users

Running the 'less' Linux command on files downloaded from the Internet is dangerous, a researcher said


Traces of Regin malware may date back to 2006

Regin was known about for some time by the security industry, according to Symantec

Symantec identifies sophisticated, stealthy 'Regin' malware

The back-door-type Trojan was likely developed by a nation state, researcher say

e-gic / vaporizer batteries from joyetech

FUD: E-Cig chargers said to be delivering malware

There was a headline in The Guardian on Friday, related to two topics that interest me personally: malware and vaping. The story is sensationalist, promoting FUD to a growing segment of the population already inundated by false claims...

ransom note letters

Ransom malware attacks underscore limitations of anti-virus software

Trail of destruction

Businessman holding holiday gift box 187371991

Raising awareness quickly: Holiday tips and tricks

The holidays are here. From now until the end of the year, the retail sector will see a business boom, while organizations both large and small deal with staffers who opt to become part of the shopping rush.

NotCompable sets new standards for mobile botnet sophistication

The NotCompatible mobile malware has reached a new level of sophistication. The malware was first detected in 2012, but the newly discovered variant, NotCompatible.C, is the most complex mobile malware ever seen.

admiral mike rodgers nsa

NSA chief says cyberattacks on industrial systems are his top concern

Nation states and groups are engaging in risky behavior in the absence of cyberspace rules

policyjne radiowozy

Intel to work with Europol on fighting cybercrime

Intel's McAfee branch will share technical information with the European Cybercrime Centre


Activists release Detekt tool that finds surveillance malware

The tool is a joint project of multiple privacy groups who investigated malware used to target journalists and human rights activists


Long-running Android botnet evolves, could pose threat to corporate networks

The 'NotCompatible' Android Trojan now uses peer-to-peer encrypted communication, researchers from Lookout said

malware keyboard

Attackers trading malware for privilege

Hackers will use malware, among other techniques, to break into enterprise systems but once they're in, they're likely to switch away from malware to abusing privileged accounts.

malware primary 100369041 orig

Android and iOS apps still being cloned to spread malware

Finance, healthcare and retail are top targets


Scammers move from Ebola phishing to fundraising

Scammers routinely try to take advantage of humanitarian disasters to get people to open phishing emails, or to donate money to fake organizations. This month, they combined the two approaches, sending out approximately 700,000 spam...

People talking illustration

Bash malware targets embedded devices running BusyBox

Attackers use malware dubbed Bashlite to scan for and install backdoors on routers and other systems running BusyBox


New ransomware CoinVault allows users to decrypt one file for free

Cybercriminals use freebie tactic in attempt to increase ransomware success rate

trends data chart growing ladder cloud

The top infosec issues of 2014

Security experts weigh in on the top IT security trends of 2014, what was learned and what needs to be done

us state department

Reports: State Department admits intrusion into unclassified email

The agency shut down its unclassified email system and parts of its website on Friday, according to the reports

Load More