Please turn on your JavaScript for this page to function normally.
Unredacted US diplomatic cables inadvertently leaked

Daniel Domscheit-Berg’s rationale behind his destruction of some 3,500+ unpublished files was that he had done it because Julian Assange and WikiLeaks could not …

Facebook pays bug hunters $40,000 in three weeks

The recently introduced Facebook bug bounty program has proved to be a great success, says Joe Sullivan, the company’s chief security officer. “We know and have …

Rogue Google SSL certificate allowed MITM Gmail attacks

Recently discovered attempts of an SSL man-in-the-middle attack against Google users – spotted by a number of Iranian Internet users – have revealed that Dutch …

Google servers as a DDoS tool

Google’s servers can be used by cyber attackers to launch DDoS attacks, claims R00T_ATI, a penetration tester for Italian security consulting firm AIR Sicurezza. He …

Hurricane Irene scams hit Facebook

As predicted, Hurricane Irene-themed scams have begun spreading on Facebook. The one spotted by Trend Micro fraud analyst Karla Agregado lures users in by offering a chilling …

Morto worm spreads via RDP, brute-forces Administrator accounts

There’s a new worm in town and it’s the first one that spreads by taking advantage of the Remote Desktop Protocol (RDP). “Once a machine gets infected, the …

Fake Facebook friend request, now with hidden iFrame

A slight variation of last week’s Facebook friend request spam email campaign has been spotted targeting the social network’s users, and this one employs a …

Google search results much cleaner than in 2010

It used to be that among the first ten pages of search results for popular terms, up to 90 percent of the offered links would take the users to a malicious page serving …

Is this the phishing email that caused the RSA breach?

“I forward this file to you for review. Please open and view it,” says simply the email that is thought to have been the means of deploying the backdoor that …

Illegal keygen for well-known AV solution leads to infection

An illegal key generator for the recently released latest version of the TrustPort Internet Security solution brings big trouble to unsuspecting users, warns BitDefender. …

Bitcoin mining botnet also used for DDoS attacks

A recently discovered P2P Bitcoin mining botnet has acquired DDoS capabilities, warns Kaspersky Lab expert Tillmann Werner. It’s main reason of existence has so far been …

Zeus rival boasts of eluding tracker services, fails

Kaspersky Lab expert Jorge Mieres wrote yesterday about Ice IX – the first crimeware based on the leaked Zeus source code. “Ice IX Botnet is the first new …

Don't miss

Cybersecurity news