Tinder safe dating spam uses safety to scam users out of money
Scammers drive users to fake verification site that signs them up to adult webcam and erotic video websites.Read More
View ArticlePatchwork cyberespionage group expands targets from governments to wide range...
Symantec finds that Patchwork now targets a variety of industries in the US, China, Japan, South East Asia, and the UK.Read More
View ArticleAnother media-stealing app found on Google Play
The HTML Source Code Viewer app by Sunuba Gaming poses as a development tool then steals pictures and videos from mobile devices.Read More
View ArticleBackdoor.Remvio: Highly customizable remote access Trojan sold online
The new Trojan can be used to steal information and passwords from compromised computers.Read More
View ArticleLatest Intelligence for July 2016
Our latest intelligence reveals that the Neutrino toolkit’s activity rose more than 10 percentage points in July.Read More
View ArticleNew ransomware mimics Microsoft activation window
A new ransomlock variant, which mainly affects the US, tricks users into calling a toll-free number to reactivate their Windows computer.Read More
View ArticleStrider: Cyberespionage group turns eye of Sauron on targets
Low-profile group uses Remsec malware to spy on targets in Russia, China, and Europe.Read More
View ArticleMicrosoft Patch Tuesday – August 2016
This month the vendor is releasing nine bulletins, six of which are rated Critical.Read More
View ArticleInstagram accounts hacked, altered to promote adult dating spam
Scammers are hacking Instagram accounts and altering profiles with sexually suggestive imagery to lure users to adult dating and porn spam.Read More
View ArticleShark: New Ransomware-as-a-Service threat takes bite of proceeds
The creators of Shark have made it freely available, but demand a 20 percent cut of its profits.Read More
View ArticleEquation: Has secretive cyberespionage group been breached?
A new attack group has released a data dump of leaked exploits and hacking tools they claim belong to the Equation group.Read More
View ArticleNon-existent video involving Hillary Clinton and ISIS leader used as bait in...
Malicious attachment contains Adwind cross-platform remote access Trojan.Read More
View ArticleTrident: Trio of iOS zero-days being exploited in the wild
Users of iPhones and other iOS devices are advised to upgrade to the latest version of the operating system.Read More
View ArticleBuckeye cyberespionage group shifts gaze from US to Hong Kong
Several organizations in Hong Kong are being targeted by a cyberespionage group known as Buckeye.Read More
View ArticleLatest Intelligence for August 2016
Our Latest Intelligence reveals that the number of new malware variants hit 45.5 million in August, the highest level seen since last year.Read More
View ArticleMicrosoft Patch Tuesday – September 2016
This month the vendor released 13 bulletins, six of which are rated Critical.Read More
View ArticleIoT devices being increasingly used for DDoS attacks
Malware is infesting a growing number of IoT devices, but their owners may be completely unaware of it.Read More
View ArticleFive ways Android malware is becoming more resilient
Newly observed techniques used by Android malware authors attempt to make things more difficult for victims and security products.Read More
View ArticleScammers spoof TaiG, offer fake iOS jailbreak
Scammers are spoofing the popular TaiG jailbreaking site to offer a fake iOS 9.2.1 jailbreak tool that leads to a donation page.Read More
View ArticleAndroid.Lockscreen ransomware now using pseudorandom numbers
The latest Android.Lockscreen variants are using new techniques to improve their chances of obtaining ransom money.Read More
View Article