Please turn on your JavaScript for this page to function normally.
Aerospace and defense firms targeted with clever spear phishing

Directors, vice presidents and other top management of companies in the aerospace industry and U.S. government and defense contractors have recently been targeted with a …

Scareware trends and expected developments

While malware such as viruses, worms and Trojans strives to remain hidden from view for as long as possible, scareware (rogueware and ransomware) aims to be as noticeable and …

China-based hackers infiltrated New York Times’ network

The New York Times’ computer systems and network has been breached and its journalists’ private computers and email correspondence spied on for a period of four …

Firefox will block by default nearly all plugins

Following the recent debacle of the critical Java 0-day that was being actively exploited in the wild, in an attempt to minimize its users’ attack surface Mozilla has …

FedEx-themed malicious emails bombarding inboxes

FedEx customers are constantly targeted with malicious emails supposedly coming from the global courier delivery service, but since the start of the year, FedEx-themed spam …

Bogus Windows 8 activators collect users’ private info

Despite Windows 8 sales being not as good as Microsoft hoped, there is considerable interest in the new OS version. Still, not everybody wants to pay to try it out, and …

Internet-facing printers remain a huge risk

Despite repeated warnings about office and home devices being accessible from the Internet when there is no good reason for them to be, every now and then someone gets the …

Google offers over $3M for breaking Chrome OS

With $3.14159 prize pool and a completely new target, Google’s Pwnium contest has become an even greater challenge for security researchers out to make a buck from their …

U.S. DoD’s cybersecurity force to increase fivefold

The Pentagon is poised to start searching for more than 4,000 new employees for the Defense Department’s Cyber Command, in a bid to boost its cyber defensive and …

Facebook’s CPO tackles privacy policy questions

When late last year Facebook changed its Statement of Rights and Responsibilities and Data Use Policy, the social network’s users lost their right to vote on future …

Trojan uses anti-spam system to keep in touch with C&C servers

Most malware is severely crippled if it can’t contact the C&C servers from which it receives its instructions and updates, so malware authors are constantly coming …

AV developer Avast starts bug bounty program

Avast, the Prague-based maker of the popular eponymous AV software, has announced the introduction of a bug bounty program. Rewards are offered only for security-related bugs …

Don't miss

Cybersecurity news