A new version of a file-infecting malware program that's being distributed through drive-by download attacks is also capable of stealing FTP (File Transfer Protocol) credentials, according to security researchers from antivirus firm Trend Micro.
The attackers did not exploit any vulnerabilities, but they opened up accounts and used the services as their infrastructure
Paying rewards to independent security researchers for finding software problems is a vastly better investment than hiring employees to do the same work, according to researchers from the University of California Berkeley.
Technical details and a proof-of-concept exploit have been published for a recently announced Android vulnerability that potentially affects millions of devices and allows attackers to turn legitimate apps into Trojan programs.
A report from security vendor McAfee into March attacks in South Korea, which wiped data from bank computers, shut down ATMs and crippled government websites, describes a much less conspicuous parallel operation designed to steal classified military data.
Distributed Spam Distraction attacks may last up to 24 hours, and inundate an inbox with as many as 60,000 messages, AppRiver report notes in a report.
Games are the most common form of malware-infected app, according to Mobile Security: McAfee Consumer Trends Report for June 2013.
A persistent, widespread malware campaign that utilizes compromised Apache servers is locking users' computers and demanding a fee of $300 to free their data.
China saw an increase in Trojan and botnet attacks coming from other countries in 2012, as the amount of mobile malware in the country also surged, according to a local security group.
The market for buying social media fans is more vibrant than ever, and services designed to detect scammers are proving increasingly useless.