Please turn on your JavaScript for this page to function normally.
How does cell phone money laundering work?

In Russia, most cell phone SIM cards are prepaid. One of the major Russian operators offers a legal service that allows anyone to transfer the prepaid amount of money from a …

New techniques for detecting hardware Trojans

Most Internet users know about the existence of software Trojans, but that of hardware ones is less known. They consist of integrated circuits that have been modified by …

DARPA invites white hats to help with U.S. cyber defense

The Defense Advanced Research Projects Agency (DARPA) is asking the government to ramp up its cyber research funding from $120 million to $208 million for 2012, and in the …

Motorola attempted to crush competitor via “Chinese spy ring” allegations

Four years ago a software engineer that worked for Motorola was arrested by U.S. Customs agents as she was trying to board a plane heading for China. Hanjuan Jin was carrying …

Fake Kaspersky AV solution offered via spam emails

Rogue AV software mimicking popular legitimate AV solutions is occasionally offered by cyber crooks in the hopes that the familiar name and look will entice users into buying …

Computershare insider loses USBs with stolen customer financial data

Computershare, one of the largest financial market services and technology providers in the world, has filed a suit with the Massachusetts District Court against former …

SCADA systems flaws exploited to open prison doors

The discovery of the Stuxnet worm has alerted governments around the world about the possibility of industrial control systems being targeted by hackers and has made a lot of …

Anonymous admits leaking personal info on 16,000 Finns

Anonymous has taken responsibility for the personal information of some 16,000 Finns ending up on a file sharing site on Saturday, and has additionally made public the …

iOS flaw allows App Store apps download malicious code

Since the App Store’s inception, Apple has been carefully examining applications submitted by third-party developers in order to assure its customers a malware-free …

Another Dutch CA confirms breach, stops issuing certificates

Another Certification Authority has admitted a breach into its systems and has decided to suspend the issuing of digital certificates as a precaution until more details are …

Brazilian ISPs hit with massive DNS cache poisoning attacks

A massive DNS cache poisoning attack attempting to infect users trying to access popular websites is currently under way in Brazil, warns Kaspersky Lab expert Fabio Assolini. …

Why do malicious Android apps come from China?

It seems like every time we hear about a malicious application aimed at Android users, it is always distributed by third-party Chinese app markets. You might wonder why the …

Don't miss

Cybersecurity news