Carbanak: Multi-million dollar cybercrime gang focuses on banks rather than...
The activities of the financial crime group have been tracked by Symantec for some time.Read More
View ArticleEquation: Advanced cyberespionage group has all the tricks in the book, and more
Sophisticated Equation attackers take malware to a new level.Read More
View ArticleCorrupt IPS definition package impacted 32-bit versions of Internet Explorer
Symantec is warning that 32-bit versions of Internet Explorer are being impacted as a result of a deployed definition package. We have released a fix for this issue through our LiveUpdate servers.Read...
View ArticleRamnit cybercrime group hit by major law enforcement operation
Assisted by Symantec and other industry partners, Europol has seized large amount of gang’s infrastructure.Read More
View ArticleCybercriminals phish iCloud credentials from victims of iPhone, iPad theft
Attackers have created phishing sites to trick users whose iOS devices have been lost or stolen into handing over their iCloud credentials.Read More
View ArticleFinancial Trojans in 2014: Takedowns contributed to 53 percent drop in...
While the number of financial Trojan detections decreased in 2014, the threat was still considerable, as attackers moved to bypass newer security measures.Read More
View ArticleFREAK vulnerability can leave encrypted communications open to attack
A recently reported flaw lets attackers force secure connections to use a weaker, breakable form of encryption.Read More
View ArticleBrazilian consumers under attack by Boleto malware
The Boleto payment system is unique to Brazil but that doesn’t mean it escapes the attention of malware authors.Read More
View ArticleMicrosoft Patch Tuesday – March 2015
This month the vendor is releasing fourteen bulletins covering a total of 45 vulnerabilities. Nineteen of this month's issues are rated ’Critical’.Read More
View ArticleIs IoT in the Smart Home giving away the keys to your kingdom?
Symantec analyzed 50 smart home devices and found that many of them included several basic security issues, such as weak authentication and common web vulnerabilities.Read More
View ArticleNew OpenSSL vulnerability could facilitate DoS attacks
Vulnerability (CVE-2015-0291) rated as high severity by OpenSSL.Read More
View ArticleNanoCore: Another RAT tries to make it out of the gutter
The road to success is never straightforward. This is a tale of a RAT developer’s persistence in the face of endless setbacks.Read More
View ArticleGreen Coffee and Spam: Elaborate spam operation on Twitter uses nearly...
Lone spam operator impersonated major brands and reality TV stars to promote miracle diet pill spam.Read More
View ArticleTwitch botnet malware lets scammers fraudulently earn money through gaming...
Attackers have been compromising users’ computers to add them to botnets, which are rented out to artificially inflate Twitch channel audience numbers.Read More
View ArticleNew reconnaissance threat Trojan.Laziok targets the energy sector
A new information stealer, Trojan.Laziok, acts as a reconnaissance tool allowing attackers to gather information and tailor their attack methods for each compromised computer.Read More
View ArticleCoordinated takedown disrupts Changeup malware distribution network
Law enforcement agencies and security vendors join forces to take down long running malware delivery network.Read More
View ArticleRansomware: Return of the mac(ro)
Ransomware attackers have resorted to reviving a very old attack vector, the malicious Word macro.Read More
View ArticleSimda botnet hit by Interpol takedown
Infrastructure owned by the Simda botnet (also known as Rloader) has been seized in an Interpol-led law enforcement operation.Read More
View ArticleMicrosoft Patch Tuesday – April 2015
This month the vendor is releasing 11 bulletins covering a total of 26 vulnerabilities. Thirteen of this month's issues are rated ’Critical’.Read More
View Article2015 Internet Security Threat Report: Attackers are bigger, bolder, and faster
Volume 20 of Symantec’s Internet Security Threat Report (ISTR) reveals that cyberattackers are infiltrating networks and evading detection by hijacking company's infrastructures, while also extorting...
View Article