Please turn on your JavaScript for this page to function normally.
Fake Flash update leads to malicious add-ons

Fake Flash update notifications are old news, but users still fall for the trick. In the latest example unearthed by Zscaler’s Julien Sobrier, one such notification …

App retrieving contactless credit card details pulled from Google Play

The Near Field Communication (NFC) protocol – supported and present on the latest smartphones – can be misused to steal data, say Symantec researchers. They tested …

Bogus BancorpSouth emails lead to exploit kit

Fake security related notices ostensibly coming from BancorpSouth, a bank holding company operating mainly in the South of the United States, have been hitting users’ …

Trojan infection triggers massive printing jobs

If your printers start printing garbage characters until they run out of paper, it’s a sure sign your network has been hit by the Milicenso Trojan. According to Symantec …

PayPal sets up bug bounty program

Joining the likes of Google, Facebook, Mozilla and others, PayPal has announced that it will be offering money for information about security bugs that affect their site …

AutoCAD worm steals blueprints, sends them to China

Duqu and Flame are not the only pieces of malware interested in grabbing AutoCAD files, says ESET researcher Righard Zwienenberg. A sudden spike on ESET’s LiveGrid Early …

Windows 8 will be harder to exploit

A lot of things have already been revealed about the security features of the upcoming Windows 8: there will be a picture password sign in option; a built-in antivirus …

LinkedIn hit with class action suit following password leak

It seems that LinkedIn can’t catch a break these days. Following the discovery that its mobile app for iOS devices is sending potentially confidential information to the …

Hackers leak customer data after firm refuses to pay ransom

Hacking collective “Rex Mundi” has leaked a batch of personal and financial information belonging to individuals who have applied for loans with online loan …

Compromised website serving “state-sponsored” 0-day exploit

The still unpatched Microsoft XML Core Services vulnerability (CVE-2012-1889) that allows attackers to gain the same user rights as the logged on user and execute malicious …

Google detects 9500 malicious sites per day

Five years after it was first introduced, Google’s Safe Browsing program continues to provide an invaluable service to the 600 million Chrome, Firefox, and Safari users, …

Julian Assange asking for asylum in Ecuador

WikiLeaks founder Julian Assange has applied for political asylum at the Ecuadorian embassy in London on Tuesday, reports Wired. After having its final extradition appeal …

Don't miss

Cybersecurity news