Please turn on your JavaScript for this page to function normally.
PoC keylogger app for smartphones revealed

We are all familiar with keyloggers – software that registers and identifies the keys pressed by a computer user – and its prevalently malicious uses. One of the …

Your name as a Google AdWord

It used to be that advertisers were forbidden from using proper names as Google AdWords, but not anymore. Forbes writer Kashmir Hill discovered that while searching her own …

Fraudster broke into bank accounts by using Facebook info

An English man has been been found guilty of siphoning money out of bank accounts after using social networks to guess the security questions for the account owners’ …

SpyEye source code and crack for the toolkit leaked

Three months after Zeus’ source code has been spotted being sold for small amounts on underground online markets, Xyliton – a French security researcher and member …

IE 9 best option against Web-based malware attacks

Microsoft’s Internet Explorer 9 has proved once again to be the best choice when it comes to catching attacks aimed at making the user download Web-based malware. This …

Adobe acknowledges the 80 Flash Player bugs found by Google

Following Adobe’s latest release of patches for a number of its products, a discussion was started by Google researcher Tavis Ormandy who claimed that he himself has …

Android malware answers calls, eavesdrops on users

Android users are two-and-a-half times as likely to encounter malware today than just six months ago, say the recently revealed results of an extensive analysis by Lookout. …

Third-party Firefox add-ons to be blocked automatically

Mozilla has decided to put a stop to the automatic installing of Firefox add-ons by third-party applications, as unwanted and disused add-ons can sometimes affect the …

San Francisco protests halted by cell phone service shut down

As a wave of protests big and small sweeps over the entire globe, presidents, prime ministers and even companies are determined to not allow protesters to communicate and …

Banking Trojan that steals from the rich

To be sure, it steals from the poor, too, but it contains a routine that automatically tries to transfer a rather large amount of money from the victim’s account to …

DDoS attack disrupts trading on Hong Kong’s stock exchange

The website of Hong Kong’s stock exchange has been hit by a DDoS attack and trading has been suspended as the site in question is used for publishing announcements by …

US officials incessantly targeted with phishing emails

Remember the phishing attack against government officials and political activists that was disrupted by Google in June? Well, it’s far from over. The goal remains the …

Don't miss

Cybersecurity news