Four tax scams to watch out for this tax season
Symantec Security Response outlines tax-related scams that individuals and businesses should not fall for during each tax season.Read More
View ArticleSamsam may signal a new trend of targeted ransomware
A new crypto-ransomware variant may indicate a shift towards targeting businesses with malware that encrypts their files.Read More
View ArticleNew Flash zero-day exploited by attackers in the wild
Patch due to be published this week for critical new Adobe Flash vulnerability CVE-2016-1019.Read More
View ArticleLatest Intelligence for March 2016
The Latest Intelligence for March 2016 reveals that the average number of mobile malware variants has reached 50 per family.Read More
View ArticleNew Adobe Flash Player exploit used by Magnitude and Nuclear exploit kits
Exploit kits (EKs) including Magnitude and Nuclear have begun to exploit a type confusion vulnerability in Adobe Flash Player (CVE-2016-1019).Read More
View ArticleMicrosoft Patch Tuesday – April 2016
This month the vendor is releasing 13 bulletins, six of which are rated Critical.Read More
View ArticleBurrp compromised to serve Angler EK and deliver TeslaCrypt ransomware
An Indian restaurant recommendation site contains injected code which redirects users to the Angler EK, which in turn drops TeslaCrypt (Trojan.Cryptolocker.N) on the computer.Read More
View ArticleKeRanger: First Mac OS X ransomware emerges
Compromised BitTorrent installer used to spread ransomware that encrypts files on Mac OS X computers.Read More
View ArticleMicrosoft Patch Tuesday – March 2016
This month the vendor is releasing 13 bulletins, five of which are rated Critical.Read More
View ArticlePhishers are creating YouTube channels to document their attacks
Phishing attacks have linked back to YouTube channels where phishers explain their attacks and promote their tools while looking for buyers.Read More
View ArticleLatest Intelligence for February 2016
The Latest Intelligence for February 2016 reveals that one in every 125 emails sent last month contained malware.Read More
View ArticleSuckfly: Revealing the secret life of your code signing certificates
A China-based APT group has an insatiable appetite for stolen code-signing certificates.Read More
View ArticleFinancial threats 2015: 73 percent drop in financial Trojan infections but...
Although detections dropped, financial Trojans are becoming far more capable and criminals are increasingly targeting institutions directly.Read More
View ArticleNew iOS vulnerability could allow attackers to crack encrypted iMessage...
CVE-2016-1788 is difficult to exploit, but within the capabilities of nation state attackers. Users are advised to update to iOS 9.3 to reduce the risk of attack.Read More
View ArticleWhat you need to know about election apps and your personal data
Presidential primary apps can gather a lot of information and may expose sensitive data.Read More
View ArticleTick cyberespionage group zeros in on Japan
Compromised websites and spear-phishing emails used to infect targets with Daserf TrojanRead More
View ArticleMalware may abuse Android’s accessibility service to bypass security...
Mobile financial malware authors may borrow tricks from adware by using Android’s accessibility service to circumvent OS improvements.Read More
View ArticleLatest Intelligence for April 2016
Our latest intelligence reveals Nuclear exploit kit comprised 42 percent of all web attacks, and 71 percent of all social scams spread through manual sharing.Read More
View ArticleMicrosoft Patch Tuesday – May 2016
This month the vendor is releasing 16 bulletins, eight of which are rated Critical.Read More
View ArticleInternet Explorer zero-day exploit used in targeted attacks in South Korea
Microsoft has patched an Internet Explorer zero-day vulnerability (CVE-2016-0189), which was exploited in targeted attacks in South Korea.Read More
View Article