Please turn on your JavaScript for this page to function normally.
Phishers target eBay customers via live chat support

U.K.-based ISP Netcraft is warning users about phishers impersonating eBay’s live chat support feature in the hopes of getting their hands on eBay users’ login, …

Blackhatonomics: An Inside Look at the Economics of Cybercrime

If you need to get in the minds of cyber criminals to understand their motives and the economics of cyber crime, this book is enough to get you started.

Beware of fake AV and ransomware combo

Ransomware and fake antivirus solutions are well-known threats, but a deadly fraudulent combination of the two has been recently spotted by Total Defense researchers. The …

Pentagon report accuses China military of cyber espionage

The Pentagon has come out and said it: “China is using its computer network exploitation (CNE) capability to support intelligence collection against the U.S. diplomatic, …

Attackers breach and encrypt TV station’s email server

The email server of FOX21 News has been hacked over the weekend and the information it contained held ransom. The attackers were asking for $5,000 to decrypt the information …

U.S. media sites compromised, lead to malware

At least five U.S. media sites and a number of other popular ones have been compromised and are redirecting visitors to malicious URLs, Zscaler warns. The sites have been …

IE8 0-day used in watering hole attacks

Last week a U.S. Department of Labor website was discovered to be redirecting users to sites serving a hard-to-detect variant Poison Ivy backdoor Trojan. Researchers are now …

Malware you can “live with”, but shouldn’t

The main symptom of a computer being infected with the ZeroAccess (or Sirefef) malware is that online searches via Google Search often lead to unhelpful pages filled with ads …

IRC/HTTP based DDoS bot nukes other bots

Online underground markets seem to offer anything and everything a budding cyber criminal might need. Compromised online accounts? They’ve got them. Malicious domain …

Top Android AV software fooled by common evasion techniques

A team of researchers from Northwestern University and North Carolina State University have tested ten of the most popular Android anti-virus software and have discovered that …

Google Glass hacked, could be used for spying

The advent of Google Glass – the Augmented reality, head-mounted display that looks like a pair of glasses (albeit a little more high-tech) and allows users to access …

A primer on Bitcoin risks and threats

Bitcoin is a digital currency whose creation and transfer is based on an open source cryptographic protocol. There are many benefits to using it (no transaction fees, …

Don't miss

Cybersecurity news