A backdoor Trojan horse, which would allow a remote hacker to access your Mac computer without your knowledge and potentially snoop on your files and activity, has been discovered hidden inside a boobytrapped Word document.
The latest variants of the information stealing SpyEye Trojan are now specializing in hiding fraudulent transactions from your online banking statements. Should we rethink giving up on our paper statements?
SophosLabs has been tracking an increase in targeted attacks focused on hospitality and education organizations. The malware steals credit card data directly from memory for later retrieval by the criminals involved.
London's Metropolitan Police Service has announced the conviction and sentencing of two Ukrainian cybercrooks.
The pair raided innocent victims' bank accounts of at least $4.5 million in just six months.
Enjoy the latest security news in brief by watching 60 Second Security!
This episode: the German Bundestrojaner controversy, Sony breached (again!), Duqu dubbed "Son of Stuxnet", OS X anti-anti-virus and Microsoft videos hacked.
Malware has infected the control systems used by the United States Air Force to fly Predator and Reaper drones, logging keypresses as the unmanned aircraft are flown remotely in Afghanistan, Libya, Pakistan and other conflict zones.
Was the R2D2 Trojan used by German law enforcement agencies to spy on citizens?
Read our FAQ, and learn more about this unfolding case.
A Trojan horse allegedly created by the German government to spy on citizens' online activity and Skype conversations has been discovered.
Sit back, eat your popcorn, and get ready for the political storm if this proves to be true.
After Microsoft's shutdown of the Kelihos botnet on Monday some suggested it would slow down Mac malware purveyors. While the shutdown of the botnet and the cz.cc domain will help, it's only temporary.
Technology blogger Mark Maunder recently wrote about an intrusion to his WordPress site.
The culprit was a widespread image-tweaking utility called timthumb. Learn what happened and how to fix it.
The word Trojan has many meanings, and when it is used without qualification in headlines, it's hard to know which one is meant.
So here's some weekend polymathery for you. Enjoy. (Yes. There is a connection to computer security.)
A new Trojan fake anti-virus is in the wild and targeting both Mac and Windows users. Even worse, it is spreading through poisoned Google image searches. Is your Mac protected?
Don't just read the latest computer security news - watch it in 90 seconds!
This month: parcel-tracking malware goes large, HBGary Federal gets owned, OS X gets a Trojan of sorts, and Windows 7 gets SP1 at last.
The author of the DarkComet malware contacted us to disclaim any association with the BlackHole RAT Trojan we wrote about last week. Find out the specifics of what this means, if anything.
A new remote access Trojan for Mac OS X surfaced in the lab showing malware authors are actively developing for Apple computers. Read on to learn its capabilities and how it works.
In malware analysis, it is quite common to come across attacks that you quite simply cannot believe could really work. I quite often find myself asking the question how anyone could actually fall victim to that? Yesterday, one of my colleagues was analyzing a banking Trojan that provided just such a case.