Beware of Fake Complaint Emails from BBB

Another email scam that uses the name and logo of the Better Business Bureau (BBB) has continued to…

Google Play Store may soon get a built-in malware scanner

Google intends to release a future update to its Google Play Store that will provide client-side protection from…

New ransomware spreads through malicious links in Skype IMs

A new malicious worm that spreads through Instant Messages (IMs) over Skype has been discovered. This worm manifests…

How to remove the FBI Moneypak virus from an infected machine

Last month we had highlighted the growing threat of a fake FBI notice in the United States which…

The evolving nature of malware and security threats

The composition of malware has changed considerably over the last few years. What used to be an independent…

Will Windows 8 “ELAM” be the David for “Malware” Goliath?

AntiMalware vendors have the uphill task of tackling thousands of malware on a daily basis. One of the…

The different types of malware seen in the wild

We repeatedly speak about the different techniques that attackers use to infect machines with malware. We also provide…

Microsoft disrupts major botnet by blocking malicious domain

Microsoft recently won a court order to host “3322.org”, a nefarious Internet domain based in China, with its…

Oracle releases Java 0-day vulnerability security patch

Yesterday we highlighted the Java 7 0-day vulnerability (CVE-2012-4681) that necessitated immediate attention by disabling the Java plug-in….

How to avoid the latest Java 0-day vulnerability

Java application software has always been extremely vulnerable due to its cross-platform nature. Exploits developed for this software…