Please turn on your JavaScript for this page to function normally.
Data-stealing Android Trojan masquerades as greeting-sending app

Text messages have largely replaced seasonal (and non) greeting cards, and there are mobile apps out there that let you send prewritten witty/sweet messages to friends and …

Pentagon officials allowed to use Android

US Department of Defense officials that need a mobile device are no longer restricted to using a BlackBerry, reports Muktware. The Pentagon has now also allowed the use of …

Anonymous targets security think tank, pilfers sensitive data

The hacking collective Anonymous has downed the website and stolen client information belonging to Stratfor (Strategic Forecasting Inc.), a US-based research group that …

Ditching Java might be a good move

As unpatched Java vulnerabilities are frequently taken advantage by exploit kits and users often forget to update Java, F-Secure’s Mikko Hypponen says that maybe …

Researcher blasts Siemens for lying about SIMATIC bugs

The contentious issue of responsible and coordinated vulnerability disclosure has been revisited again as security researcher Billy Rios reacted to a statement made by Siemens …

Chinese hackers infiltrated US Chamber of Commerce

The computer systems of the US Chamber of Commerce, a lobbying group that represents the interest of US businesses and trade organizations, have been infiltrated by hackers. …

Fake eBay pages offering iPhone 4S for half the price

As more and more people take advantage of the option of buying things online, and especially during the holiday season, cyber crooks continually devise new schemes to trick …

Anonymous aims to make US Senators accountable for their votes

A group of Anonymous-affiliated hackers has made public a considerable amount of detailed personal information of the majority of the 86 US Senators that voted for the …

Amazon users targeted with fake shipping notices

The BlackHole exploit kit has become an increasingly popular way of delivering malware to unsuspecting users. By exploiting a series of unpatched Windows, Java and Adobe …

Android Trojan used for political activism

In the overwhelming majority of cases, mobile Trojans are designed to steal money or information which will ultimately be monetized. But occasionally, there are some out there …

Kim Jong-il death spam carries malware

As expected, malicious spam taking advantage of the death of North Korean leader Kim Jong-il has been hitting inboxes since the news was announced. The emails contain a simple …

Ransomware impersonating European police agencies

Ransomware has been around for quite some time and likely won’t disappear soon, as it usually does manage to make inexperienced users fork over to the criminals quite a …

Don't miss

Cybersecurity news