Please turn on your JavaScript for this page to function normally.
Resurgence of malware signed with stolen certificates

Since 2009, variants of the Winwebsec rogue AV family have been trying to trick users into believing their computer has been infected and into paying for …

NSA can easily decrypt private cell calls

A document from the seemingly inexhaustible trove delivered by former NSA contractor Edward Snowden shows that the NSA can easily break the old and weak algorithm still used …

Shady Android AV pushed onto unsuspecting users

A deceptive advertising campaign pushing a shady antivirus solution is actively targeting Android users, warns Malwarebytes’ Armando Orozco. The pop-ups are triggered …

WhatsApp-themed spam campaign delivers malware

A new WhatsApp-themed spam campaign has been spotted targeting users of the popular IM service. The spam email claims to be a notification about a voice message someone left …

Easy-to-remember, difficult-to-crack passwords via visual cues

A group of researchers from Carnegie Mellon University’s School of Computer Science believe they might have solved the problem of choosing and, above all, remembering …

Cryptolocker copycat targets US, European users

A Cryptolocker copycat has been spotted targeting users in the US, Europe and Russia, but it looks that this new ransomware is less deadly that the original that inspired its …

Security implications of Google’s decision to display images in Gmail by default

This Thursday, Google announced that it will, once again, be displaying attached images in emails sent to Gmail users by default. Years back, Google decided to stop doing just …

Flaw in Nvidia’s rendering software allows hijacking of “computer farms”

A vulnerability in Nvidia mental ray, an extremely popular 3D-rendering software that is often used on “render farms”, could allow attackers to take control of …

Facebook users hit with phishing and malware combo attack

An interesting phishing / malware delivery campaign has been spotted targeting Facebook users. It all starts with a message from a Facebook friend, claiming that the user or …

64-bit Zeus Trojan version found and analyzed

Infamous banking Trojan Zeus can now be used to steal information via 64-bit versions of web browsers, and has the capability of connecting to its C&C server via the Tor …

Flawed Android app devkit puts users in danger of MitM attacks

In this age of prevalently free software and services, it’s difficult to make users pay for apps, and especially so in the Android ecosystem. Consequently, mobile app …

NSA uses Google cookies to track and target suspects

Newly published documents from Edward Snowden’s trove show that the NSA and its British counterpart GCHQ use Google’s “preferences” cookies to follow …

Don't miss

Cybersecurity news