Please turn on your JavaScript for this page to function normally.
Fake BBC emails lead to Blackhole, Zeus

Spam emails supposedly coming from CNN and the BBC and delivering links to trending news stories have once again become the preferred way for malware peddlers to lure …

What do users look for in a security solution?

Users are aware of the dangers in the Internet and most of them are already using a security solution, say the results of AV-Comparatives’ annual survey that polled …

Five cuffed for stealing 2M euros via e-banking hacks

Five people were arrested last week when the Slovenian police conducted a series of house searches following an investigation into an gang that was emptying business bank …

Apple adds two-step verification option to iCloud accounts

Apple has finally introduced a two-step verification feature that will allow its users to secure their iCloud (Apple ID) accounts, 9 to 5 Mac reports. The option is currently …

On US, China, cyber espionage, and cyber war

The accusations and recriminations lobbed back and forth between the United States and China regarding alleged state-sponsored cyber espionage attacks have become almost a …

Unraveling the South Korean cyberattacks

Wednesday’s news that the networks of several South Korean broadcasting organizations and banks have been partially or entirely crippled by coordinated attacks has …

Cisco devices saddled with weakened password encryption

Instead of improving it, an implementation issue has left a “limited” number of Cisco IOS and Cisco IOS XE releases with a weaker password hashing algorithm, …

Researcher points out critical Samsung Android phone vulnerabilities

Tired of waiting for Samsung to fix a string of critical flaws in their smartphones running Android, Italian security researcher Roberto Paleari has decided to inform the …

Researcher ropes poorly protected devices into botnet to map the Internet

A fascinating but technically illegal experiment conducted by an anonymous researcher has witnessed over 420,000 Internet-connected devices being roped into a botnet that …

Hacktivists leak info on undercover Montreal police officers

The names, phone numbers and job titles of thousands of police officers and other employees of the Montreal police department (Service de police de la Ville de Montreal, or …

Chinese military hacker unit cleaning up its tracks

When the computer forensic and incident response firm Mandiant publicly released their report on the Chinese military hacking unit dubbed APT1, they predicted that the group …

Client-Side Attacks and Defense

Whether it's security vulnerabilities in software used by millions of home users and employees, or the natural human tendency to trust what comes at us, but even the most …

Don't miss

Cybersecurity news