Please turn on your JavaScript for this page to function normally.
Backdoor targeting Apache servers spreads to nginx, Lighttpd

Last week’s revelation of the existence of Linux/Cdorked.A, a highly advanced and stealthy Apache backdoor used to drive traffic from legitimate compromised sites to …

Anonymous’ OpUSA is under way

Anonymous’ “Operation USA” began yesterday and among its first confirmed victims is the Honolulu Police Department. According to Hawaii News Now, the …

Phishers target eBay customers via live chat support

U.K.-based ISP Netcraft is warning users about phishers impersonating eBay’s live chat support feature in the hopes of getting their hands on eBay users’ login, …

Blackhatonomics: An Inside Look at the Economics of Cybercrime

If you need to get in the minds of cyber criminals to understand their motives and the economics of cyber crime, this book is enough to get you started.

Beware of fake AV and ransomware combo

Ransomware and fake antivirus solutions are well-known threats, but a deadly fraudulent combination of the two has been recently spotted by Total Defense researchers. The …

Pentagon report accuses China military of cyber espionage

The Pentagon has come out and said it: “China is using its computer network exploitation (CNE) capability to support intelligence collection against the U.S. diplomatic, …

Attackers breach and encrypt TV station’s email server

The email server of FOX21 News has been hacked over the weekend and the information it contained held ransom. The attackers were asking for $5,000 to decrypt the information …

U.S. media sites compromised, lead to malware

At least five U.S. media sites and a number of other popular ones have been compromised and are redirecting visitors to malicious URLs, Zscaler warns. The sites have been …

IE8 0-day used in watering hole attacks

Last week a U.S. Department of Labor website was discovered to be redirecting users to sites serving a hard-to-detect variant Poison Ivy backdoor Trojan. Researchers are now …

Malware you can “live with”, but shouldn’t

The main symptom of a computer being infected with the ZeroAccess (or Sirefef) malware is that online searches via Google Search often lead to unhelpful pages filled with ads …

IRC/HTTP based DDoS bot nukes other bots

Online underground markets seem to offer anything and everything a budding cyber criminal might need. Compromised online accounts? They’ve got them. Malicious domain …

Top Android AV software fooled by common evasion techniques

A team of researchers from Northwestern University and North Carolina State University have tested ten of the most popular Android anti-virus software and have discovered that …

Don't miss

Cybersecurity news