Please turn on your JavaScript for this page to function normally.
DevilRobber Trojan returns, masquerades as PixelMator

DevilRobber, the latest Trojan to target Mac users, got updated. As you may remember, the previous incarnation stole Bitcoins from the user’s wallet file, used the …

Hearing on draconian new U.S. piracy legislation is under way

Today’s the day of the long awaited House Judiciary Committee’s hearing on the Stop Online Privacy Act (SOPA) and, as the Electronic Frontier Foundation claims, …

Facebook trims response to data requests

After the possibility to request data from Facebook under European data privacy laws became common knowledge, Europeans began inundating the social networks with requests. …

The Basics of Hacking and Penetration Testing

Have you always wondered about how penetration testing is performed, but never had the opportunity to ask a professional about it or to witness him (or her) at work? If that's …

Hacker breached, changed grades in university academic record system

Santa Clara University, a private university run by the Jesuits and located in the Silicon Valley, has issued a statement confirming that it has called the FBI to investigate …

Windows 8 to do away with constant restarts after updating

I don’t know a single Windows user who isn’t annoyed at the number of times the operating system requires a restart, and especially annoyed when the request …

Hiding messages in VoIP packets

A group of researchers from the Institute of Telecommunications of the Warsaw University of Technology have devised a relatively simple way of hiding information within VoIP …

What hides behind the get-rich-working-from-home offers?

Do you ever get tempted to click on one of the myriad of work-from-home, get-paid-huge-money adverts that are littering the Internet? Do you ever wonder if those claims are …

Bogus chat spying Facebook app targets users

No matter how often fake “See who viewed your profile” apps are touted on Facebook, there are always users that fall for the trick and follow the steps required by …

Trojan masquerading as PDF signed with stolen government certificate

Since the discovery of the Stuxnet worm, and especially after the recent string of certification authority compromises, cyber attackers’ practice of using digital …

Mass manipulation through automated social engineering

In the past few years, social engineering has become cyber attackers’ preferred method for gaining access to target systems, and it usually takes the form of a spoofed …

Cyber crooks should get tougher sentences, says PCeU chief

Cyber fraudsters and robbers often receive considerably lighter sentences that their real-world counterparts, says Detective Superintendent Charlie McMurdie, the head of …

Don't miss

Cybersecurity news