Please turn on your JavaScript for this page to function normally.
Malicious MIDI files lead to rootkit malware

A Windows Media remote code execution flaw that has been patched in the last Patch Tuesday is being exploited by attackers in the wild to deliver malware to the targets’ …

PoC exploits for Linux privilege escalation bug published

The publication of proof-of-concept exploit code for a recently spotted privilege escalation flaw (CVE-2012-0056 ) in the Linux kernel has left Linux vendors scrambling to …

Compromised Tumblr accounts sporting fake Starbucks gift cards

It is a well known fact that compromised legitimate websites are often used by cyber crooks to drive traffic towards their scammy sites. The latest example of this practice …

Symantec advises customers to stop using pcAnywhere

In a perhaps not wholly unexpected move, Symantec has advised the customers of its pcAnywhere remote control application to stop using it until patches for a slew of …

Critical flaws in Symantec’s pcAnywhere patched

After having been notified by Symantec about the theft of the software’s old source code and the increased security risk that incident entails for them, users of the …

“Frankenmalware” active in the wild

If you’re not careful and you don’t use anti-malware software, you might end up with various viruses, Trojans and worms on your computer. But, according to …

Rogue apps make comeback in “Hours spent on Facebook” scam

Rogue Facebook applications were at one point in time extremely popular with scammers, but users getting wise regarding that approach have made the crooks steer clear of them …

Searching for Google Chrome can lead to malicious content

Searching for a link to download Google Chrome might result in a malware infection, warns a Websense researcher. According to him, if a user enters the term “Download …

Hacker allegedly leaks 100K Facebook account credentials of Arab users

The slew of hacks, leaks of credit card information, DDoS attacks and defacements executed by Arab and Israeli hackers that transferred part of the longstanding, real world …

Researchers discover network of 7,000 typo squatting domains

A network of some 7,000 typo squatting domains is being used by scammers to effectively drive traffic towards their scammy sites, some of which get so much traffic that they …

Pwn2Own 2012: Changed rules, bigger prizes, no more mobile hacks

Pwn2Own, one of the most anticipated hacking contests that takes place each year at the CanSecWest conference in Vancouver, British Columbia, is set to unfold under …

Kelihos malware author, botnet herder named by Microsoft

Microsoft has named a new defendant in the ongoing Kelihos case. His name is Andrey N. Sabelnikov, of St. Petersburg, Russian Federation, and is believed to have written the …

Don't miss

Cybersecurity news