Please turn on your JavaScript for this page to function normally.
Fake eBay pages offering iPhone 4S for half the price

As more and more people take advantage of the option of buying things online, and especially during the holiday season, cyber crooks continually devise new schemes to trick …

Anonymous aims to make US Senators accountable for their votes

A group of Anonymous-affiliated hackers has made public a considerable amount of detailed personal information of the majority of the 86 US Senators that voted for the …

Amazon users targeted with fake shipping notices

The BlackHole exploit kit has become an increasingly popular way of delivering malware to unsuspecting users. By exploiting a series of unpatched Windows, Java and Adobe …

Android Trojan used for political activism

In the overwhelming majority of cases, mobile Trojans are designed to steal money or information which will ultimately be monetized. But occasionally, there are some out there …

Kim Jong-il death spam carries malware

As expected, malicious spam taking advantage of the death of North Korean leader Kim Jong-il has been hitting inboxes since the news was announced. The emails contain a simple …

Ransomware impersonating European police agencies

Ransomware has been around for quite some time and likely won’t disappear soon, as it usually does manage to make inexperienced users fork over to the criminals quite a …

Windows 8 will have picture password sign in

As much as security experts would like for it to be otherwise, experience has taught us that no matter how many times some people are lectured on the use of complex passwords, …

Latest spam campaigns delivering the Zbot Trojan

For a while now, fake messages and warnings from USPS, FedEx and DHL about supposedly undelivered packages have been hitting inboxes, and users have been getting wiser about …

Visa probes into potential card processor security breach

Credit card company Visa has announced that it has been informed of a potential data security breach at a European payment processor and that it has mounted an investigation …

How to avoid malware hiding behind QR codes

As the use of QR codes becomes increasingly widespread, users should be aware that they are also becoming an easy way for malware peddlers to spread their malicious wares. …

How to spot fake Android apps

In the wake of the news that Google has again been removing Premium SMS fraudulent apps masquerading as popular games from its the official Android Market, TrendMicro’s …

GlobalSign reports CA infrastructure wasn’t compromised

When the self-styled ComodoHacker – who also claimed responsibility for the DigiNotar hack – boasted that he had access to GlobalSign’s “entire …

Don't miss

Cybersecurity news