Please turn on your JavaScript for this page to function normally.
Huawei working hard on its image

Chinese telecommunication equipment giant Huawei is working hard on proving to the Australian government that the use of their products will not pose a threat to national …

Georgia shows photos of Russian-based hacker spy

A Russian-based hacker has been unmasked as one of the attackers behind a long-standing campaign aimed at compromising computers belonging to Georgian ministries, parliament, …

Can the Nuclear exploit kit dethrone Blackhole?

In a market dominated by the mega-popular Blackhole exploit kit (newly upgraded to version 2.0) and the somewhat less sought-after Eleonore and Phoenix exploit packs, can the …

Bank of America customers under phishing attack

Bank of America customers, beware – the old “account suspended” warning purportedly sent by your bank’s Cardmember Services is hitting inboxes once …

Facebook investigates data leak from 1 million accounts

Facebook will be launching an internal investigation following the revelation by Czech blogger Bogomil Shopov that data belonging to over one million Facebook users was …

Israel Police pulled computers offline due to RAT infestation

Trend Micro researchers have managed to get their hands on the malware that caused the Israeli Police Department to pull all of its systems offline last Thursday, and the …

Yahoo! will disregard Do Not Track requests from IE 10 users

As more and more browser developers add the support for the Do Not Track header to their products, and since Microsoft’s decision of making IE10 have the Do Not Track on …

A surveillance system that can anticipate trouble

Two researchers from the Psychology Department of the Carnegie Mellon University have managed to create a video surveillance system that not only follows human activity, but …

“Free Windows 8” offer leads to email hijacking

Hot on the heels of the recent release of Windows 8 and a generic spam campaign supposedly delivering a Windows license comes another attempt to take advantage of unwary …

Privacy-invading module found in thousands of apps on Google Play

An advertising module embedded into over 7,000 “free” fake versions of legitimate Android apps that can be found on Google Play is actively harvesting a ton of …

Malware authors turn to simpler detection evasion techniques

Given the huge amount of malware variants created each year, it is understandable that malware researchers count on automated threat analysis systems to single them out for …

Malicious “Your Photos” email from fake LinkedIn users

If you receive an email seemingly coming from a LinkedIn user, asking you to open an attachment in order to see “your photos” – don’t do it! Opening …

Don't miss

Cybersecurity news