Please turn on your JavaScript for this page to function normally.
A peek in the world of vulnerability sellers

As you probably already know, this year’s edition of Pwn2Own wasn’t the only hacking contest at the CanSecWest conference held earlier this month. Pwn2Own rules …

Google educates Gmail users on spam

Educating computer users about security is something that every online service should consider doing, and I’m glad to see that Google has started explaining why its …

Duqu developers still active, researchers say

Duqu, the infamous remote access Trojan first discovered in November 2011 and thought to have been created by the same authors as Stuxnet, is still getting modified by its …

Carberp gang arrested in Russia

Eight men have been arrested in Moscow for having allegedly stolen over $2 million from the bank accounts of over 90 Russian individuals by infecting their computers with the …

Computer and biological viruses might eventually converge

The term “computer virus” was coined by Fred Cohen in the early 1980s, because like its biological counterparts, the computer virus is essentially a sequence of …

Beware of fake Google AV

Cyber crooks are once again trying to take advantage of Google’s name and logo to push malware onto unsuspecting users. According to GFI researchers, a number of pages …

Facebook privacy loophole allows regular spying on users

With over 845 million active users, Facebook is a great source of willingly shared information for anyone who can effectively become a “Facebook friend” with the …

Phishers trick gamers with adult cam show offer

A rather clever phishing scheme targeting Italian gamers has recently been spotted by Symantec researchers. The scammy page, hosted on a free web hosting site, was made to …

Apple, Facebook and others named in privacy lawsuit

Thirteen individuals have filed a lawsuit against a number of app makers including Path, Facebook, Instagram, Yelp and Rovio, accusing them of uploading the information stored …

US govt and military email addresses offered for sale

Cyber crooks are very well aware that information is a very lucrative commodity and that every type of information has potential buyers. Take email addresses, for example. …

Europeans targeted with new ransomware

In the last couple of years, malware that hijacks the users’ machines and demands money to “unblock” it has become an often encountered threat. Messages …

Fake LinkedIn emails serve malware

Emails purportedly coming from business-related social network LinkedIn have been hitting inboxes in the last couple of days, ostensibly reminding recipients of invitations …

Don't miss

Cybersecurity news