The banking trojan has added use of remote desktop to evade security software.
Fiesta Exploit Kit Starts Delivering a Double Payload
Malware authors are looking for more bang for the buck.
Backoff PoS Malware is Crafty and Dangerous, US-CERT Warns
The card-scraping bug have been undetectable by AV systems so far.
Twitter Government Access Requests Jump 50%
Washington wants to know more about micro-blogging users than any other government, according to latest Transparency Report.
Russia Demands Apple and SAP Hand Over Source Code
Kremlin wants tech giants to prove they’re not a conduit for NSA spying.
Internet of Things Laid Bare: 25 Security Flaws Per Device
HP researchers discover 70% of the most common devices have vulnerabilities.
Crippling DDoS Hits Major Aussie Broadband Provider
Cirrus Communications had half of its network taken down by attack earlier this week.
Chinese Hackers Use APTs to Target Gaming Companies
TG-3279 group wants to play games for free or re-use source code in competing products, says Dell
Cloud Security Alliance Develops Assessment Spec for Third Parties
The STAR Attestation is aimed at CPA assessments.
DDoS-ers Launch Attacks From Amazon EC2
Cybercriminals exploit vulnerability in Elasticsearch software to infiltrate cloud instances.