Don't-Miss Antivirus software Stories

Ice IX Malware Tricks Facebook Users Into Exposing Credit Card Details, Says Trusteer

A new configuration of the Ice IX malware attempts to trick its victims into exposing their credit card details when they try to access their Facebook accounts...

Unpatched Java Vulnerability Exploited to Infect Macs With Flashback Malware

A Java vulnerability that hasn't yet been patched by Apple is being exploited by cybercriminals to infect Mac computers with a new variant of the Flashback...

Most 2011 Cyberattacks Called 'Avoidable'

Default or simple passwords, ineffective or nonexistent firewalls offered easy targets for security breaches, a Verizon report finds.

Malware, Phishing Gather in North America

An annual review of global security threats identifies the U.S. and Canada as the primary source of malware attack focus.

Microsoft Battles the Bots

Zeus botnet server takedowns and other small victories in Microsoft's crusade help keep the web safer, but only for a while.

Kelihos Gang Is Building a New Botnet, Researchers Say

The cyber-criminal gang that operated the recently disabled Kelihos botnet has already begun building a new botnet with the help of a Facebook worm, according to...

Do-it-yourself Plan to Take Down Sality Botnet Outlined on Public Mailing List

A method that anyone can use to hijack a massive multipurpose botnet called Sality was described in detail on a public mailing list on Tuesday.

Malware Infects Macs Through Microsoft Office Vulnerability

Security researchers have encountered new email-based targeted attacks that exploit a vulnerability in Microsoft Office to install a remote access Trojan horse...

Google Offers Users Monthly Reports on Account Activity

Want to check how Google-reliant you are? Now you can.

Security Firms Disable the Second Kelihos Botnet

A group of malware experts from security companies Kaspersky Lab, CrowdStrike, Dell SecureWorks and the Honeynet Project, have worked together to disable the...

Facebook Scammers Host Trojan Horse Extensions on the Chrome Web Store

Cybercriminals are uploading malicious Chrome browser extensions to the official Chrome Web Store and use them to hijack Facebook accounts.

Mobile Malware: Beware Drive-by Downloads on Your Smartphone

Drive-by downloads are coming to your smartphone, and they're harder to detect than traditional PC-based versions. Here's how you can protect yourself, your users and your enterprise from mobile drive-by downloads.

Most Webmasters Don't Know How Their Websites Got Hacked, Report Says

Most owners of compromised websites don't know how their sites got hacked into and only 6 percent detect the malicious activity on their own.