Please turn on your JavaScript for this page to function normally.
Critical Java 0-day flaw exploited in the wild

Researchers from security firm FireEye have discovered targeted attacks exploiting a zero-day Java vulnerability to deliver the Poison Ivy RAT onto the unsuspecting …

Dropbox introduces 2-factor authentication

Early this month, popular file hosting service Dropbox confirmed an internal breach the resulted in its European users receiving spam advertising gambling websites, and …

“Tax Payment Rejected” spam campaign

Bogus emails supposedly coming from the US Internal Revenue Service (IRS), informing users that their “tax transaction” has been cancelled and trying to get them …

Crisis malware doesn’t affect most VMware hypervisors

A few days ago Symantec researchers revealed that the Crisis malware is not limited to attacking Mac machines, but has the ability to infect devices running Windows and …

“Compensation for Scam Victims” 419 scam doing rounds

The psychology and economics behind the so-called Nigerian advanced fee fraud scams have been recently been explained by Microsoft researcher Cormac Herley in great detail, …

Female Android users targeted with Loozfon Trojan

An information-stealing piece of Android malware that is currently being used in a campaign aimed specifically at female Japanese users has been spotted by Symantec …

Aramco hackers threaten to attack oil giant again

The group of hackers that claimed responsibility for the recent Saudi Aramco breach has announced that it will be targeting the company again because they want to prove that …

US Feds shutter three Android app pirate sites

For the first time since it has started the war against illegal sites, the US Department of Justice has swooped on three websites that were engaged in the illegal distribution …

Bogus Booking.com emails carry malware

The popularity of the Booking.com, one of the world’s biggest and most used online hotel reservations agency is getting misused in the latest malware distribution …

Google instituting internal Privacy Red Team

Google is looking for a Data Privacy Engineer to be part of an internal team whose goal will be to find – and remove – privacy risks in the company’s many …

The Tangled Web: A Guide to Securing Modern Web Applications

We all use the Internet to some extent and browsers to surf through it. With security vulnerabilities affecting them and the technologies that allow them to function popping …

FTC to investigate websites allegedly collecting data from children

As the years roll by, Internet users are getting more aware of the need to actively protect their privacy. But there is one group of people that is overwhelmingly unaware of …

Don't miss

Cybersecurity news