Please turn on your JavaScript for this page to function normally.
Offers from domain resellers evade spam filters

The Internet has created a great amount of business opportunities – most of them legal, some not and some that fall in the gray area between the two extremes. An example …

Sesame Street YouTube channel hacked

Followers of the Sesame Street YouTube channel have had a nasty surprise when they tuned in on Sunday. Instead of the children-friendly videos they were faced with pretty …

“Facebook lost your messages” spam returns

Facebook users are constantly targeted by emails posing as legitimate notifications from the popular social network, and the latest ones are an upgraded version of an old fake …

How the German “Federal Trojan” was actually used

After the Chaos Computer Club hackers made public the results of their analysis of a few samples of the so-called “Federal Trojan” and found it capable of more …

WineHQ database breached; Fedora Project forces password change

Following last month’s compromises of the primary repository for the Linux kernel source code and the websites and infrastructure of the Linux Foundation comes the news …

Trojanized Netflix app steals account login credentials

When Netflix released an Android client app earlier this year, it also witnessed the attempts of various app developers who tried to make a pirated copy of it work on other …

Verisign asks for ability to suspend domains without a court order

Verisign, the operator for all .com, .net, and .name top-level domain, has submitted a request to ICANN asking for the power of taking down “abusive” domains …

90,000 accounts compromised in new Sony attack

60,000 PlayStation Network and Sony Entertainment Network accounts and 33,000 Sony Online Entertainment accounts have been compromised during what Sony describes as a testing …

Two state-sponsored groups responsible for RSA breach

Two distinct groups were behind the March attack against RSA’s networks, said RSA president Tom Heiser, and they seem to have been directed in their efforts by a single …

Large-scale spam campaign uses compromised webmail accounts and WordPress sites

A spam campaign currently under way has been spotted coming from several thousand compromised Yahoo!, AOL and Hotmail email accounts and taking advantage of compromised …

German states say “federal trojan” used within legal boundaries

The reaction following CCC’s claims that a government-made “lawful interception” Trojan has abilities that exceed those allowed by the nation’s …

Fake virus warning from company IT department brings real malware

Emails purportedly coming from a company’s IT department has been spotted targeting users of various big companies and trying to make them download malware for the last …

Don't miss

Cybersecurity news