Monthly Archives: February 2012

BlackHole exploit kits gets updated with new features

February 29, 2012By Blog Staff

According to independent sources, the author of the most popular web malware exploitation kit currently dominating the threat landscape, has recently issued yet another update to the latest version of the kit v1.2.2. More…read more

A peek inside the Elite Malware Loader

February 29, 2012By Blog Staff

Just like today’s modern economy, in the cybercrime ecosystem supply, too, meets demand on a regular basis. With malware coding for hire propositions increasing thanks to the expanding pool of talented programmers looking…read more

How cybercriminals monetize malware-infected hosts

February 27, 2012By Blog Staff

The vibrant cybercrime underground ecosystem offers countless ways to monetize the malware-infected hosts at the disposal of the malicious attacker. From converting them to anonymization proxies assisting cybercriminals in covering their Web activities,…read more

A peek inside the Ann Malware Loader

February 25, 2012By Blog Staff

The ever-adapting cybercrime ecosystem is constantly producing new underground releases in the form of malware loaders, remote access trojans (RATs), malware cryptors, Web, IRC and P2P based command and control interfaces, all with…read more

Report: 3,325% increase in malware targeting the Android OS

February 17, 2012By Blog Staff

Which is the most targeted mobile operating system? According to the recently released 2011 Mobile Threats Report from our partners at Juniper Networks, that’s the Android OS. Key summary points from the report: