Please turn on your JavaScript for this page to function normally.
Facebook extends Graph Search to include posts, updates, comments

Since its launch earlier this year, Facebook Graph has slowly been filled with information about users. First came the interests they had, the locations they visited, the …

NSA creates US citizens’ profiles by collecting metadata, public and commercial data

In 2010, NSA analysts were instructed to disregard previous restrictions when it came to analyzing phone call and email logs belonging to Americans that had connections to …

Latest IE 0-day still unpatched, attacks exploiting it go back three months

While Microsoft is yet to issue a patch for the latest Internet Explorer zero-day (CVE-2013-3893), reports are coming in that the flaw has been exploited more widely and for a …

Two youngsters arrested for different DDoS attacks

Following the massive DDoS attack against anti-spam outfit Spamhaus earlier this year, a 35-year-old Dutch citizen believed to be Sven Kamphuis, the owner and manager of Dutch …

Researchers may have solved the click fraud problem

Click fraud is a considerable drain on the finances of both advertiser and ad networks, but a group of researchers believed that they have managed to create a simple solution …

US intelligence heads speak for FISA preservation

Two opposite forces have clashed in Thursday’s open hearing by the US Senate Intelligence Committee on the subject of potential legislative changes to the Foreign …

NSA letter reveals details of NSA analysts spying on their lovers

Details of twelve recorded cases since 2003 in which analysts misused US intelligence agencies’ surveillance capabilities to spy on their love interest or other not …

Tor-using Mevade botnet is stealthy new version of old threat

The Mevade Trojan and botnet have gained unexpected notoriety when it turned out that the majority of the recent, sudden and massive uptick in Tor users was the result of it …

US government security background checks fumbled by investigators

Edward Snowden’s successful exfiltration of confidential NSA documents has proved that the background checks executed for government personnel in order to receive the …

Amateur hacker behind DDoS attack on China?

When, in late August, China’s Domain Name Service was targeted by a huge DDoS attack which ultimately lead to many websites being completely inaccessible for a period of …

Data broker databases breached, stolen info used by ID theft service

Stolen users information is regularly sold and bought online by cyber crooks and attackers, and many services have sprung up to meet the demand for information that can be …

Yahoo ID recycling scheme is potential security minefield

Yahoo’s recently announced email account / Yahoo ID recycling scheme was meant to free up inactive (and attractive) accounts so that they can be snapped up by another …

Don't miss

Cybersecurity news