Cybercriminals experiment with Tor-based C&C, ring-3-rootkit empowered, SPDY form grabbing malware bot by Blog Staff | Jul 2, 2013 | Industry Intel, Threat Lab Reading Time: ~ 3 min.
How cybercriminals create and operate Android-based botnets by Blog Staff | Jun 28, 2013 | Industry Intel, Threat Lab Reading Time: ~ 3 min.
Self-propagating ZeuS-based source code/binaries offered for sale by Blog Staff | Jun 27, 2013 | Industry Intel, Threat Lab Reading Time: ~ 2 min.
Rogue ‘Free Codec Pack’ ads lead to Win32/InstallCore Potentially Unwanted Application (PUA) by Blog Staff | Jun 26, 2013 | Industry Intel, Threat Lab Reading Time: ~ 2 min.
Infographic: Malicious Mobile Apps by Blog Staff | Jun 25, 2013 | Industry Intel, Threat Lab Reading Time: ~ < 1 min.
SIP-based API-supporting fake caller ID/SMS number supporting DIY Russian service spotted in the wild by Blog Staff | Jun 25, 2013 | Industry Intel, Threat Lab Reading Time: ~ 2 min.
Rogue ‘Free Mozilla Firefox Download’ ads lead to ‘InstallCore’ Potentially Unwanted Application (PUA) by Blog Staff | Jun 24, 2013 | Industry Intel, Threat Lab Reading Time: ~ 4 min.
New subscription-based SHA256/Scrypt supporting stealth DIY Bitcoin mining tool spotted in the wild by Blog Staff | Jun 21, 2013 | Industry Intel, Threat Lab Reading Time: ~ 2 min.
New E-Shop sells access to thousands of malware-infected hosts, accepts Bitcoin by Blog Staff | Jun 20, 2013 | Industry Intel, Threat Lab Reading Time: ~ 2 min.
Rogue ‘Oops Video Player’ attempts to visually social engineer users, mimicks Adobe Flash Player’s installation process by Blog Staff | Jun 19, 2013 | Industry Intel, Threat Lab Reading Time: ~ 3 min.
New boutique iFrame crypting service spotted in the wild by Blog Staff | Jun 18, 2013 | Industry Intel, Threat Lab Reading Time: ~ 2 min.
Rogue ads target EU users, expose them to Win32/Toolbar.SearchSuite through the KingTranslate PUA by Blog Staff | Jun 17, 2013 | Industry Intel, Threat Lab Reading Time: ~ 2 min.