Please turn on your JavaScript for this page to function normally.
Google reveals it is already scanning Android apps for malware

Even though most malicious Android apps are served from third-party app markets, cyber crooks occasionally manage to disseminate some via Google’s official Android …

HTC Android phones allow apps to harvest users’ Wi-Fi password

A bug in the way some Android-running HTC smartphones handle requests for password allows some applications to send the user’s Wi-Fi network username, password and SSID …

Facebook survey scam bundled with phishing attempt

Facebook survey scammers have lately become great fans of browser add-ons that force scammy messages onto the victims’ Wall and News feed, but in a recent campaign they …

Network Warrior, 2nd Edition

If you are interested in knowing everything that you can possibly know about networking, chances are you were already urged to read Gary Donahue's Network Warrior. Four years …

Government website passwords published by Anonymous

As the moment when the new legislation for defending the rights of copyright holders regarding online sharing will be discussed is coming near, the Irish politician pushing it …

Romanian hacker TinKode allegedly arrested

A 20-year old Romanian believed to be “TinKode”, the infamous hacker that has breached the systems and defaced the pages of several government organizations, has …

Defense companies persistently targeted by cyber spies

Researchers from security companies Zscaler and Seculert have issued a warning about bogus emails targeting employees of defense-related organizations around the world in …

Fake Tumblr Staff Blog offers still targeting users

A week ago, compromised Tumblr accounts were sporting fake messages from a “Tumblr Staff Blog” offering Starbucks gift cards in return for completing surveys and …

Counterclank: Info-stealing Trojan or advertising tool?

A couple of days ago, Symantec has warned about Counterclank, an Android Trojan that has been unknowingly installed by users on over five million devices. This huge number was …

Law firms get hacked for deal data

A successful cooperation between a law firm and its clients depends on the firm’s ability of keeping the details of these relationships confidential – something …

Compromised WordPress sites lead to Phoenix exploit kit

Several hundred compromised websites that at first glance don’t appear to be malicious have been discovered by M86 researchers. The websites – mostly blogs and …

The F-BOMB: A tiny $50 spying computer for DARPA

Everyone loves a cheap but effective solution, and DARPA – the US Department of Defense’s agency for developing new military technologies – is no exception. …

Don't miss

Cybersecurity news