Please turn on your JavaScript for this page to function normally.
Oracle confirms existence of another critical Java flaw

When Oracle finally patched the CVE-2012-4681 Java 0-day that was being actively exploited in the wild, Polish firm Security Explorations immediately piped up to say they …

Bogus GTA Vice City Android game leads to SMS Trojan

Offering bogus packs of popular games have always been a well-liked approach of malware peddlers around the world. GFI has recently spotted a fictitious Vice City version of …

Millions of GoDaddy sites go offline due to alleged DDoS attack

GoDaddy, on of the biggest and most popular Internet domain registrars and web hosting companies in the world, has suffered an outage on Monday that left many of its …

Publishing firm says leaked Apple IDs came from their servers

BlueToad, a Florida-based digital edition publishing company, has announced that the recent massive Apple UDID leak originated from their own servers, and not an FBI laptop. …

Pirate Bay’s Svartholm arrested for hacking, not piracy

Well, as it turns out, the recent arrest of Pirate Bay co-founder Gottfrid Svartholm in Cambodia is a consequence of a “crime related to information technology,” …

Windows 8 users open to Flash exploits

Users who have downloaded and are using the “Release To Manufacturing” version of Windows 8 or the 90-day trial version of Windows 8 Enterprise should be aware …

11,000 Guild Wars 2 accounts hacked in ongoing attacks

The second sequel of the popular Guild Wars multiplayer online RPG by ArenaNet has been released less than two weeks ago, and player accounts are already being heavily …

Apache HTTP Server set to ignore IE10’s Do Not Track request

Microsoft’s decision to make Internet Explorer 10 in Windows 8 have the “Do Not Track” (DNT) option turned on by default has stirred a heated discussion …

BEAST developers come up with new SSL/TLS attack

From the security researchers who created and demonstrated the BEAST (Browser Exploit Against SSL/TLS) tool for breaking SSL/TLS encryption comes another attack that exploits …

Zero-day-loving Google hackers furiously active in last three years

The hackers behind the Aurora attacks that were discovered targeting Google, Adobe and other big U.S. companies in 2009 have seemingly been working hard ever since. Symantec …

Malicious FB Timeline Remover plugins still tricking users

It is a well-known fact that some Facebook users simply can’t stand the (relatively) new Timeline interface and have actively sought for ways to revert their accounts to …

Apple denies handing UDIDs over to FBI

As the issue of the leaked million of Apple device IDs by the AntiSec hacker group and the alleged existence of a list of over 12 million of those and other personal …

Don't miss

Cybersecurity news