Please turn on your JavaScript for this page to function normally.
Fake HD repair tool targets Windows users

In the last year, ransomware infections have taken over from scareware as the cybercriminals’ favorite mode of squeezing money out of their victims, but that …

Another alleged TeamPoison hacker arrested

A 17-year-old male that is suspected to be “MLT”, a member and the unofficial spokesman of the notorious “TeamPoison” hacking gang, has been arrested …

Trojan posing as Flash Player for Android

Russian Android users are constantly targeted with Trojans posing as legitimate apps. Last month it was fake Instagram and Angry Birds Space apps, this time the lure is a …

Two Norwegians arrested over DDoS attacks

Two Norwegian teenagers believed to have led DDoS attacks on a number of Norwegian and international websites have been arrested last Friday and Monday. The rather short …

Digital Forensics with Open Source Tools

Proprietary digital forensics tools have long been popular with the majority of forensic practitioners, but there are also open source ones that can come very handy. The book …

Fake mobile AV apps offered on Google Play

Downloading apps from Google Play, the official online Android app market, is not without its dangers. Even though Google has been scanning the offered apps for malware by …

Ransomware starts targeting US users

A year or two ago, fake antivirus solutions were pushed almost daily onto users, but as time went by, they became wiser and more able to recognize them. So cybercriminals …

MySpace charged for violating user privacy, vows to do better

Charged by the US Federal Trade Commission with violating federal law due to having shared its users’ personal information and Web browsing habits with third parties, …

Java drive-by generator used in recent attack

A malware delivery campaign that doubles its infections efforts to really make sure the users get compromised has been recently spotted by F-Secure researchers. One of them …

Privacy icons summarize privacy policies

A group of students from Yale University have shared their final project for their Control, Privacy, and Technology course which offers the novel idea of using icons to brief …

Survey scammers impersonate Apple via SMS

As the number of smartphone users increases with each passing day, survey scammers have turned some of their attention to targeting users directly via SMS messages containing …

Securing mobile apps in the enterprise

The mobile app has become the endpoint. With the advent of consumerization and BYOD, the number of managed devices began shrinking and that of unmanaged devices continues to …

Don't miss

Cybersecurity news