Malware

Want to make a quick buck and don't mind breaking a few laws in the process? You're in luck - find the right people on the Dark Web and get ready to have botnet DDoS attack source code that can take down servers with a click of a mouse. But, when we...

In one of the largest international busts of its kind, a cyber criminal infrastructure responsible for a debilitating attack called "Avalanche" is finally no more. With international support, the take-down was the result of a four-year effort with a victim count spread throughout 180 countries worldwide. Avalanche has been in use since 2009, muddying the...

A new type of malware is taking aim at tens of thousands of Android devices. According to various reports, hackers are targeting Google accounts linked to Android devices at an average daily rate of 13,000 smartphones. Considered to be the largest Google account breach to date, Gooligan - the malware in...

Just in time for the height of the holiday season - another phishing scam set to lure unsuspecting shoppers using one of the world's largest online retailers. With a 336% increase in malicious phishing links around Thanksgiving and the holidays, hackers are hard at work to take advantage of the online shopping...

Third party applications are a blessing and a curse - when properly vetted and secured by practiced cyber security veterans, they can be great tools for added growth and learning at an individual and business level. Unfortunately not all applications display this amount of integrity. Some with more questionable bases...

Spotify experienced another malicious advertising attack earlier this week - though the last occurred in 2011, the popular music platform has dealt with a number of small cyber security issues, bringing a significant idea to light. Specifically, it's one thing if a user interacts with a platform that doesn't have...

Malvertisements hide in plain sight throughout the Internet, their unassuming and indistinguishable nature making them all the more lethal to users across the World Wide Web - sometimes the only interaction needed is to land on an otherwise nondescript webpage. And while researchers recently uncovered and killed the longest-running malvertising campaign to date,...

Skimer, originally surfacing in 2009, is back and stronger than ever. For those who are unfamiliar, Skimer gives hackers complete access to an ATM without needing to install any kind of physical hardware. At one point, that was the only way a fraudster could steal bank information, duplicate it, and...

A malicious exploit in online images? Not implausible, but definitely enough to raise some eyebrows. According to online publication Engadget, hackers discovered that they could run a code of their choosing on a server of their choosing. In particular, a web-based picture processing company called ImageMagick experienced the effects of...

Google Play Store users confronted an unfortunate surprise when illegitimate banking applications were outed on the popular site. A cyber security risk doesn't faze mobile device owners as they download an application from the online store of their choice (Apple, Google, and others) without a second thought. The consumer assumption is that each...