Please turn on your JavaScript for this page to function normally.
Learn by doing: Phishing and other online tests

As a tech-savvy person in a family that mostly consists of low level Internet users – and especially because of my line of work – I’m often tasked with …

Critical flaw lets attackers control hospital, military buildings’ systems

A critical zero-day remote-access vulnerability in an industrial control system that is widely used in hospitals, military installations, manufacturing plants and other …

Massive Bamital click-fraud botnet shut down

Symantec and Microsoft have teamed up to take down the Bamital botnet, and are currently in the process of warning users infected with the Trojan on how to remove it from …

Whitehole exploit kit in the spotlight

The effectiveness of exploit kits has made them malware peddlers’ preferred way of distributing their malicious wares. The Blackhole exploit kit is, by far, the most …

Researcher warns about critical flaw in D-Link routers

A security flaw in D-Link’s DIR-300 and DIR-600 routers could allow remote attackers to inject execute arbitrary shell commands via a simple POST request without being …

Banking Trojan posing as Avast AV

A banking Trojan masquerading as the popular free AV solution from Avast has been spotted on computers of Brazilian users, reports Kaspersky Lab Expert Dmitry Bestuzhev. The …

U.S. Federal Reserve admits being breached by Anonymous

U.S. Federal Reserve confirmed the breach of one of its internal websites by the hands of Anonymous hackers, but denied that the file containing personal information of over …

Wireless Reconnaissance in Penetration Testing

Reconnaissance should always be the first stage of a cyber attack or penetration test, and the success of these attempts is usually closely tied with the quality of …

U.S. President to decide on pre-emptive cyberstrikes

As the moment when U.S. President Barack Obama will issue a cybersecurity executive order slowly draws near, other questions that affect the nation’s cyber defense and …

Japan holds first hacking contest backed by government

Despite being one of the greater world economies and being technologically advanced as few others, Japan has woken up to the reality of cyber crime relatively late. The highly …

Ad network site hack results in popular sites flagged as malicious

Google Chrome users trying to visit a slew of popular news sites such as the New York Times, the Washington Post, ZDNet and the Huffington Post on Monday were faced with …

Fake Amazon Kindle receipt leads to persistent malware

Amazon customers buying e-books for their Kindle or other mobile devices should be careful with emails that seemingly containing receipts for their purchases, warns Webroot, …

Don't miss

Cybersecurity news