A Russian-speaking group is advertising "bulletproof" hosting for cybercriminals from data centres in Syria and Lebanon, an apparent effort to place new services in locales where Western law enforcement has little influence. The ...
Tags: bulletproof, Russian, cybercriminals, data centre, Internet
New attack campaigns have infected point-of-sale (PoS) systems around the world with sophisticated malware designed to steal payment card and transaction data. Researchers from security firm Arbor Networks found two servers that were used ...
Tags: Computer Products, software
The creators of a Web-based attack tool called Angler Exploit Kit have added an exploit for a known vulnerability in Microsoft's Silverlight browser plug-in to the tool's arsenal. Exploit kits are essentially malicious Web applications ...
Tags: Computer Products, software
The number of malware samples that use P-to-P (peer-to-peer) communications has increased fivefold during the past 12 months, according to researchers from security firm Damballa. The largest contributors to this increase are advanced ...
A new variant of the Citadel financial malware is targeting users of the Payza online payment platform by launching local in-browser attacks to steal their credentials, according to researchers from security firm Trusteer. Citadel is a ...
Tags: Payza, Payment Platform, Computer Products
Security researchers from Trend Micro have uncovered an active cyberespionage operation that so far has compromised computers belonging to government ministries, technology companies, media outlets, academic research institutions and ...
Tags: Computer Products, software
The Android threat landscape is growing in both size and complexity with cybercriminals adopting new distribution methods and building Android-focused malware services, according to a report from Finnish security vendor F-Secure. The ...
Tags: Android, Computer Products
A cybercriminal has taken to selling his malware and related services on Facebook, boldly choosing a public forum to reach potential customers over the secretive world of the online underground. RSA researchers?recently discovered?on the ...
Tags: Facebook, Computer Products
While the majority of data breaches are the result of financially motivated cybercriminal attacks, cyberespionage activities are also responsible for a significant number of data theft incidents, according to a report that will be released ...
Tags: Computer Products, software
A new piece of malware that infects point-of-sale (POS) systems has already been used to compromise thousands of payment cards belonging to customers of U.S. banks, according to researchers from Group-IB, a security and computer forensics ...
Tags: Computer Products, software
A new piece of malware that infects point-of-sale (POS) systems has already been used to compromise thousands of payment cards belonging to customers of U.S. banks, according to researchers from Group-IB, a security and computer forensics ...
Tags: POS malware, computer, net
A new piece of custom malware sold on the underground Internet market is being used to siphon payment card data from point-of-sale (POS) systems, according to security researchers from antivirus vendor McAfee. Dubbed vSkimmer, the ...
Tags: vSkimmer, malware, Internet market
A new piece of custom malware sold on the underground Internet market is being used to siphon payment card data from point-of-sale (POS) systems, according to security researchers from antivirus vendor McAfee. Dubbed vSkimmer, the ...
Tags: Vskimmer Malware, Point-of-Sale Systems, Computer Products
A new piece of custom malware sold on the underground Internet market is being used to siphon payment card data from point-of-sale (POS) systems, according to security researchers from antivirus vendor McAfee. Dubbed vSkimmer, the ...
Tags: Vskimmer Malware, Point-of-Sale Systems, Computer Products
Researchers from security firm FireEye claim that attackers are actively using a remote code execution exploit that works against the latest versions of Adobe Reader 9, 10 and 11. "Today, we identified that a PDF zero-day [vulnerability] ...
Tags: FireEye, remote code, Adobe Reader