Please turn on your JavaScript for this page to function normally.
Bomb-threatening student caught because he used Tor on school Wi-Fi

20-year-old Harvard student Eldo Kim has been accused of sending fake bomb threats to Harvard University on Monday. What makes this case interesting is that he used the Tor …

MacBook webcam indicator light can be disabled to aid spying

Two researchers from Johns Hopkins University have proved, without a doubt, that it is possible to activate internal iSight webcams included in some legacy Apple machines …

OpenX / Revive Adserver zero-day actively exploited in the wild

A zero-day vulnerability that allows attackers to gain back-end access to popular open-source advertising server OpenX Source has been discovered by Florian Sander, founder of …

Obama panel advises big changes to NSA surveillance practices

The “independent” Review Group on Intelligence and Communications Technologies ordered to be created by US president Barack Obama in August has finally delivered …

Target breach affects millions who shopped at their stores

US retail giant Target is investigating a security breach that could turn out to be one of the biggest ever, involving compromised payment card information of millions of its …

India set to escalate Internet surveillance

The Indian government is all but set to launch Netra (Network Traffic Analysis), a surveillance system capable of analysing online communication in near real-time and …

DDoS botnet spreading on Linux and Windows machines

A blended DDoS botnet consisting of both Windows and Linux machines has been detected by researchers working with the Polish CERT. The botnet is exclusively dedicated to …

Effective new Trojan skims card info from widely used ATMs

Researchers from Russian AV company Doctor Web have managed to get their hands on a Trojan aimed at recording and collecting card information from one of the most widespread …

Easily deflected ransomware relies on victims’ embarrassment

The appearance of Browlock ransomware earlier this year demonstrates that this type of malware does not need to wreak much havoc on the targets’ computer to be taken …

IE flaw targeted in Aurora attacks still actively exploited

Regular software patching is often touted as one of the best things you can do to keep your computer safe against malware infection. Unfortunately, not all users follow that …

How effective are Android AV solutions?

As the onslaught of Android malware continues, the recently released testing results by independent IT-security institute AV-Test show that most providers of Android antivirus …

Mozilla blocks rogue add-on that made computers scan sites for flaws

A singular new botnet composed of over 12,500 infected computers has been used by its masters to effectively crowdsource the search for websites vulnerable to SQL injection …

Don't miss

Cybersecurity news