Please turn on your JavaScript for this page to function normally.
Verisign asks for ability to suspend domains without a court order

Verisign, the operator for all .com, .net, and .name top-level domain, has submitted a request to ICANN asking for the power of taking down “abusive” domains …

90,000 accounts compromised in new Sony attack

60,000 PlayStation Network and Sony Entertainment Network accounts and 33,000 Sony Online Entertainment accounts have been compromised during what Sony describes as a testing …

Two state-sponsored groups responsible for RSA breach

Two distinct groups were behind the March attack against RSA’s networks, said RSA president Tom Heiser, and they seem to have been directed in their efforts by a single …

Large-scale spam campaign uses compromised webmail accounts and WordPress sites

A spam campaign currently under way has been spotted coming from several thousand compromised Yahoo!, AOL and Hotmail email accounts and taking advantage of compromised …

German states say “federal trojan” used within legal boundaries

The reaction following CCC’s claims that a government-made “lawful interception” Trojan has abilities that exceed those allowed by the nation’s …

Fake virus warning from company IT department brings real malware

Emails purportedly coming from a company’s IT department has been spotted targeting users of various big companies and trying to make them download malware for the last …

“I saw a real bad blog about you” Twitter phishing scam

Twitter has been warning users not to fall for the latest phishing scam that takes the form of a DM from someone you know warning you to check out a “real bad blog about …

U.S. military drones hit by computer virus

An unnamed virus with a “keylogger” payload has been found in the computers used to operate U.S. Air Force’s Predator and Reaper remotely operated drones. …

Virus Bulletin news tweets spread malware

Malware peddlers are known for using news of unfolding events as lures to trick curious users into clicking on an offered malicious link. This practice is most often seen on …

Government telecommunication-spying malware opens backdoor

The Chaos Computer Club claims that a government-made “lawful interception” Trojan has abilities that exceed those allowed by the nation’s legislature and …

Photos: The look and feel of Virus Bulletin 2011

Help Net Security is attending the Virus Bulletin 2011 conference in Barcelona this week. Here’s an overview of the event in photos. DC Bob Burls of UK’s Police …

Picasa Web Albums and Yahoo! Groups are loved by spammers

Cyber crooks and spammers are always on the lookout for ways to reach and victimize the largest amount of individuals possible. And sometimes even Internet giants such as …

Don't miss

Cybersecurity news